Analysis

  • max time kernel
    140s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    12-02-2022 04:00

General

  • Target

    164e8c58906f4e7416d3a5549308d7ca76aca2d17aa2d8aba72a23372e61f3bf.exe

  • Size

    191KB

  • MD5

    65d78822698d3d21c6a7b26c21b0d431

  • SHA1

    552c9a186140de92ffd0bc0e8e8243063fe92ee2

  • SHA256

    164e8c58906f4e7416d3a5549308d7ca76aca2d17aa2d8aba72a23372e61f3bf

  • SHA512

    1cafea14195886ce4d5e916db8ff7b6d9a6b89e23586e099f8ac972d02cc61c6cf1fd83354d0257b4a75e0df77e4983384846d461f61ca839621fd1d5948d4de

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Sakula Payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\164e8c58906f4e7416d3a5549308d7ca76aca2d17aa2d8aba72a23372e61f3bf.exe
    "C:\Users\Admin\AppData\Local\Temp\164e8c58906f4e7416d3a5549308d7ca76aca2d17aa2d8aba72a23372e61f3bf.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4032
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:4704
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\164e8c58906f4e7416d3a5549308d7ca76aca2d17aa2d8aba72a23372e61f3bf.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4904
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:4288
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:3816
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2768

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    d12752c5411fc82ca75f0658f9d85397

    SHA1

    6c54c16d810b2492059aa832a5e501a1f521b96b

    SHA256

    20846a60181ce6c8a30cf42ba6752e23acba20f713f57fd9500b645a366e332b

    SHA512

    5b57cd173a6d7abd3e8bb10908e5d2eca6b36adcc94b7f988f374513c39e9898a77a9e0bc807808fb158b10cae070ae4f7fe5b4ae7510b1ed0224cb3249f8a98

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    d12752c5411fc82ca75f0658f9d85397

    SHA1

    6c54c16d810b2492059aa832a5e501a1f521b96b

    SHA256

    20846a60181ce6c8a30cf42ba6752e23acba20f713f57fd9500b645a366e332b

    SHA512

    5b57cd173a6d7abd3e8bb10908e5d2eca6b36adcc94b7f988f374513c39e9898a77a9e0bc807808fb158b10cae070ae4f7fe5b4ae7510b1ed0224cb3249f8a98

  • memory/3816-132-0x000001D0B0220000-0x000001D0B0230000-memory.dmp

    Filesize

    64KB

  • memory/3816-133-0x000001D0B0280000-0x000001D0B0290000-memory.dmp

    Filesize

    64KB

  • memory/3816-134-0x000001D0B2940000-0x000001D0B2944000-memory.dmp

    Filesize

    16KB