Analysis

  • max time kernel
    144s
  • max time network
    178s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    12-02-2022 03:51

General

  • Target

    16a6f62d1792c035cb58d6419575b278e6b246b505b207a75540f14ac1ec7eec.exe

  • Size

    101KB

  • MD5

    3e1c544b9b1c4ebda7b9c820c6a56c0e

  • SHA1

    49fceb5b811bef494632397614fb19dea5ba3b19

  • SHA256

    16a6f62d1792c035cb58d6419575b278e6b246b505b207a75540f14ac1ec7eec

  • SHA512

    694dc2d978a7e7d347026874ae77671eb8e995ccf0395810d43c7f903ff165a3739bc1ac4a445528e58808ae73e4d394eae819a14f9396e495be49cc4224d64c

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Sakula Payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\16a6f62d1792c035cb58d6419575b278e6b246b505b207a75540f14ac1ec7eec.exe
    "C:\Users\Admin\AppData\Local\Temp\16a6f62d1792c035cb58d6419575b278e6b246b505b207a75540f14ac1ec7eec.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4936
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:4608
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\16a6f62d1792c035cb58d6419575b278e6b246b505b207a75540f14ac1ec7eec.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2892
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:4728
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:4904
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2136

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    e46f2ec34461299c8b1899ab89416b55

    SHA1

    b6e7f49c35712c8589f4e9cdb12ffc78ee32e37d

    SHA256

    fab72f91eb91a475d01d6a3e8b4e3371aef737cf8a14d48c48e48352ccd2e283

    SHA512

    455b5c1778023fddc14eca5936ec51cb713b331a94bc95324be2a0dcf25f642204ab9d08ae8c7f2ef034348024f36372a6c69103eb32340bcb7c5b1a8cf774fb

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    e46f2ec34461299c8b1899ab89416b55

    SHA1

    b6e7f49c35712c8589f4e9cdb12ffc78ee32e37d

    SHA256

    fab72f91eb91a475d01d6a3e8b4e3371aef737cf8a14d48c48e48352ccd2e283

    SHA512

    455b5c1778023fddc14eca5936ec51cb713b331a94bc95324be2a0dcf25f642204ab9d08ae8c7f2ef034348024f36372a6c69103eb32340bcb7c5b1a8cf774fb

  • memory/4904-132-0x000001D1E2130000-0x000001D1E2140000-memory.dmp

    Filesize

    64KB

  • memory/4904-133-0x000001D1E2190000-0x000001D1E21A0000-memory.dmp

    Filesize

    64KB

  • memory/4904-134-0x000001D1E4E80000-0x000001D1E4E84000-memory.dmp

    Filesize

    16KB