Analysis

  • max time kernel
    154s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    12-02-2022 04:00

General

  • Target

    165117aaec0d4e4bad014a148f1802f8d0d3332f067c4f6de67251c6fbb5b882.exe

  • Size

    150KB

  • MD5

    1b362b69d4aaa0407276b9da5bcfe885

  • SHA1

    42f2551911cb27b74d08b2ed2afeeb84e0365dbf

  • SHA256

    165117aaec0d4e4bad014a148f1802f8d0d3332f067c4f6de67251c6fbb5b882

  • SHA512

    e3d26337d522743a856d2dc12a700b6ecb2a3224f51e3c6cdcb15709f6c42751b54418f6a9e6bf3d8311e3737f66513109599061eaa059912c7bb74067f4bfad

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Sakula Payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\165117aaec0d4e4bad014a148f1802f8d0d3332f067c4f6de67251c6fbb5b882.exe
    "C:\Users\Admin\AppData\Local\Temp\165117aaec0d4e4bad014a148f1802f8d0d3332f067c4f6de67251c6fbb5b882.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:616
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:952
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\165117aaec0d4e4bad014a148f1802f8d0d3332f067c4f6de67251c6fbb5b882.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4916
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:428
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2716
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:1688

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    98f069e01409297bdcf51fab9a65865e

    SHA1

    39d7ee3b323e22a71788da1c262f305ffe753910

    SHA256

    0d8a96dbf769995fa92e85d3695f799ddf086edcc2893636a017b6cdf65b3733

    SHA512

    f26f6869ff2f2ccd8ff72ba0b1ff6189239436b31b227b68619b70da02428d93b1d1dd18277c6ce1f4ce2e94f56f4d3de63bd2b515ce01c6da132de653c1f12c

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    98f069e01409297bdcf51fab9a65865e

    SHA1

    39d7ee3b323e22a71788da1c262f305ffe753910

    SHA256

    0d8a96dbf769995fa92e85d3695f799ddf086edcc2893636a017b6cdf65b3733

    SHA512

    f26f6869ff2f2ccd8ff72ba0b1ff6189239436b31b227b68619b70da02428d93b1d1dd18277c6ce1f4ce2e94f56f4d3de63bd2b515ce01c6da132de653c1f12c

  • memory/2716-132-0x000002929C620000-0x000002929C630000-memory.dmp

    Filesize

    64KB

  • memory/2716-133-0x000002929C680000-0x000002929C690000-memory.dmp

    Filesize

    64KB

  • memory/2716-134-0x000002929ED50000-0x000002929ED54000-memory.dmp

    Filesize

    16KB