Analysis

  • max time kernel
    160s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    12-02-2022 03:48

General

  • Target

    16c12e4498112e163766a81dd77db105461a866bad3c35cc8b120aedc6bdfb3e.exe

  • Size

    150KB

  • MD5

    174b5a3d3fc62bc9c51aa9676ec22bf8

  • SHA1

    ccf17924d38e78374028d7a4584e00cf8da213ba

  • SHA256

    16c12e4498112e163766a81dd77db105461a866bad3c35cc8b120aedc6bdfb3e

  • SHA512

    c78022dac820f7c809c3e3e346281682654b148bec327a58e0cdaa463322ecc1d79b75504676891097563f36e6dabe427575325365c67f45669a88308180496d

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Sakula Payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 51 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\16c12e4498112e163766a81dd77db105461a866bad3c35cc8b120aedc6bdfb3e.exe
    "C:\Users\Admin\AppData\Local\Temp\16c12e4498112e163766a81dd77db105461a866bad3c35cc8b120aedc6bdfb3e.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3952
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:3804
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\16c12e4498112e163766a81dd77db105461a866bad3c35cc8b120aedc6bdfb3e.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3052
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:4020
  • C:\Windows\system32\MusNotifyIcon.exe
    %systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 13
    1⤵
    • Checks processor information in registry
    PID:3876
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k NetworkService -p
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    PID:2060
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:376

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    88ff360795fe7a6120d956e6579d51f8

    SHA1

    d13f7354ccae8b6689460f45116e63fd394a36a5

    SHA256

    0d78c06d0832453f50cff7e7da3dcac1cdb7096bd486a36d5f0d3f229c94636d

    SHA512

    a545accec0576f714f476a5dceba738086083c084655493c612545cc53cbf04a8e579db8d4ff0ea5d222698a98efa986995648720e1c50e5ecaa6aab49bffadb

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    88ff360795fe7a6120d956e6579d51f8

    SHA1

    d13f7354ccae8b6689460f45116e63fd394a36a5

    SHA256

    0d78c06d0832453f50cff7e7da3dcac1cdb7096bd486a36d5f0d3f229c94636d

    SHA512

    a545accec0576f714f476a5dceba738086083c084655493c612545cc53cbf04a8e579db8d4ff0ea5d222698a98efa986995648720e1c50e5ecaa6aab49bffadb