Analysis

  • max time kernel
    154s
  • max time network
    171s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    12-02-2022 03:55

General

  • Target

    167efe34a0ab97a47c2a58d737f9095b0c521b9e0e84ff560e1517a03293b700.exe

  • Size

    60KB

  • MD5

    0588049758b873bf5b3c3d3157942e91

  • SHA1

    76f5a6bd6c4432fa9818c040eec7f1b063d07d2a

  • SHA256

    167efe34a0ab97a47c2a58d737f9095b0c521b9e0e84ff560e1517a03293b700

  • SHA512

    df27826b0d62b12860941f328f2651b08e28f4b49d632e446d5deee1847a85a6cfb514d62d2803848aa2b2b054600d3058811c94b114178a6235ed2d90741e0d

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 54 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\167efe34a0ab97a47c2a58d737f9095b0c521b9e0e84ff560e1517a03293b700.exe
    "C:\Users\Admin\AppData\Local\Temp\167efe34a0ab97a47c2a58d737f9095b0c521b9e0e84ff560e1517a03293b700.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2612
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:3392
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\167efe34a0ab97a47c2a58d737f9095b0c521b9e0e84ff560e1517a03293b700.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2500
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:3084
  • C:\Windows\system32\MusNotifyIcon.exe
    %systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 13
    1⤵
    • Checks processor information in registry
    PID:2148
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k NetworkService -p
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    PID:2016
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2852

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    1a0c14f07a7b686e8f229093a0476f32

    SHA1

    9a2d2524062f1b6bf032a362c9d59d2d0c64b4b0

    SHA256

    9b1c397e35497f6196a5a9c3ecbb4f71d9c42ef0f20339af83b2d8678b566215

    SHA512

    e3cfd4dee63ca541a112262135620b3478e66993ff630f3bf684ef7de84c314cbd35388d26b0f83f2c33810b2f87e66ad8f8cd0cd6460c7e7972c44816687d43

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    1a0c14f07a7b686e8f229093a0476f32

    SHA1

    9a2d2524062f1b6bf032a362c9d59d2d0c64b4b0

    SHA256

    9b1c397e35497f6196a5a9c3ecbb4f71d9c42ef0f20339af83b2d8678b566215

    SHA512

    e3cfd4dee63ca541a112262135620b3478e66993ff630f3bf684ef7de84c314cbd35388d26b0f83f2c33810b2f87e66ad8f8cd0cd6460c7e7972c44816687d43