Analysis

  • max time kernel
    134s
  • max time network
    166s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    12-02-2022 03:56

General

  • Target

    166a1b6be385b9d0660b7d70abe5e8db6142420c28b9665178e95bda08de161a.exe

  • Size

    36KB

  • MD5

    dbd7e1e079e3a7d474e1e2c7f0881a51

  • SHA1

    2335d6a6837ce2a28936d70afcc07757fb5834f2

  • SHA256

    166a1b6be385b9d0660b7d70abe5e8db6142420c28b9665178e95bda08de161a

  • SHA512

    7ab153f83839d28f5c4123928dbd6b16192abd5a4c907ecf19c92b993c14cc23a33d1c68608380778e32c753a9e15c1503356bf22dee3c06191b5f962065d862

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\166a1b6be385b9d0660b7d70abe5e8db6142420c28b9665178e95bda08de161a.exe
    "C:\Users\Admin\AppData\Local\Temp\166a1b6be385b9d0660b7d70abe5e8db6142420c28b9665178e95bda08de161a.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:448
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:5052
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\166a1b6be385b9d0660b7d70abe5e8db6142420c28b9665178e95bda08de161a.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1768
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:2992
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:4396
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:4272

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    0d841e672e4f8cd1205c6b675d4b8bb6

    SHA1

    e6ffece0fba9b23451a44ea68c1d250063a56452

    SHA256

    098fd620fc989a092d9e63bf3ddfb7759caf9ded76d65bd2f2b789c39af66f20

    SHA512

    1b985b9ce2bf4260002435b09ec35aac58b0768f37375f40e0a83a5ec3c7ba62e47d10016be55af2f1e211445d10fcdde783b64d8f510995b1aa019ee5503704

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    0d841e672e4f8cd1205c6b675d4b8bb6

    SHA1

    e6ffece0fba9b23451a44ea68c1d250063a56452

    SHA256

    098fd620fc989a092d9e63bf3ddfb7759caf9ded76d65bd2f2b789c39af66f20

    SHA512

    1b985b9ce2bf4260002435b09ec35aac58b0768f37375f40e0a83a5ec3c7ba62e47d10016be55af2f1e211445d10fcdde783b64d8f510995b1aa019ee5503704

  • memory/4396-132-0x000001C33A620000-0x000001C33A630000-memory.dmp

    Filesize

    64KB

  • memory/4396-133-0x000001C33A680000-0x000001C33A690000-memory.dmp

    Filesize

    64KB

  • memory/4396-134-0x000001C33CD40000-0x000001C33CD44000-memory.dmp

    Filesize

    16KB