Analysis

  • max time kernel
    161s
  • max time network
    177s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    12-02-2022 03:49

General

  • Target

    16b5e4744412bb62eb55844b467ba274841e3036b08ea3babbee3ff6ce6793b5.exe

  • Size

    101KB

  • MD5

    52e1c43d43f3ee14b9297931f2475a5c

  • SHA1

    17a493c61cd98bf273924282eb26044e479cac82

  • SHA256

    16b5e4744412bb62eb55844b467ba274841e3036b08ea3babbee3ff6ce6793b5

  • SHA512

    2ac63bffa7005af4e10bbdd63d1f2489bdbada816f145eda13a32e048dd77947a1ea83e115fc6da4956c7e00a550ce474c0ab5d0ebf68e5613e619cf84e45741

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Sakula Payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\16b5e4744412bb62eb55844b467ba274841e3036b08ea3babbee3ff6ce6793b5.exe
    "C:\Users\Admin\AppData\Local\Temp\16b5e4744412bb62eb55844b467ba274841e3036b08ea3babbee3ff6ce6793b5.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4660
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:4180
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\16b5e4744412bb62eb55844b467ba274841e3036b08ea3babbee3ff6ce6793b5.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4100
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:1716
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2928
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:3456

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    9e35cf3f78e757566c5b19b803247807

    SHA1

    5ec8b32639eb08952c4cd2cf2830291522b1e679

    SHA256

    1849a8ebae9df7953718b2f708c0654e337975cbc61a3d95f3ae96431b1a1bb2

    SHA512

    ce8db6f97e3b9929b676f8f75c975e63b98a6d368cf57b6f96087739aa0047e0667f068b6b535e56990170e7079f6a346a328a8b68eab98e500622098e501e55

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    9e35cf3f78e757566c5b19b803247807

    SHA1

    5ec8b32639eb08952c4cd2cf2830291522b1e679

    SHA256

    1849a8ebae9df7953718b2f708c0654e337975cbc61a3d95f3ae96431b1a1bb2

    SHA512

    ce8db6f97e3b9929b676f8f75c975e63b98a6d368cf57b6f96087739aa0047e0667f068b6b535e56990170e7079f6a346a328a8b68eab98e500622098e501e55

  • memory/2928-132-0x000001CDF0360000-0x000001CDF0370000-memory.dmp

    Filesize

    64KB

  • memory/2928-133-0x000001CDF0920000-0x000001CDF0930000-memory.dmp

    Filesize

    64KB

  • memory/2928-134-0x000001CDF2FD0000-0x000001CDF2FD4000-memory.dmp

    Filesize

    16KB