Analysis

  • max time kernel
    151s
  • max time network
    165s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    12-02-2022 04:06

General

  • Target

    1609a12c61711d4d66715925f584bde27946ece3d5c92bb4b420c1e2e08820a5.exe

  • Size

    80KB

  • MD5

    4f58215601786f25c397182979c1066c

  • SHA1

    dba61b541a0a646401daaad2b4f2a96eb820dc68

  • SHA256

    1609a12c61711d4d66715925f584bde27946ece3d5c92bb4b420c1e2e08820a5

  • SHA512

    73dd9d46f8a0a86669c164b0bed728af8ab51649abcdc54c758e266a8668bf25e6519e70120e55e31487e531318aa09c2b68b7d8337016414a300c481340ba9f

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Sakula Payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1609a12c61711d4d66715925f584bde27946ece3d5c92bb4b420c1e2e08820a5.exe
    "C:\Users\Admin\AppData\Local\Temp\1609a12c61711d4d66715925f584bde27946ece3d5c92bb4b420c1e2e08820a5.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1132
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:1644
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\1609a12c61711d4d66715925f584bde27946ece3d5c92bb4b420c1e2e08820a5.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2328
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:376
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2724
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:4284

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    b67970145138507c7f361d81172e7631

    SHA1

    616dc186ab0bcc52188b97b29bcf9bd935f497f2

    SHA256

    cb8aae1de50b2c23d91ccbe845127a86f583b579f382a0a82357c89a3edbf339

    SHA512

    f0ecacb9ebc6b3831b50681a199e8e743ca44107678e15af0bfc86fd8746052df76d34967f98ef2ebc1c0b76957f3595d9ca60a637ad6eaaeeecabda4ef9d74e

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    b67970145138507c7f361d81172e7631

    SHA1

    616dc186ab0bcc52188b97b29bcf9bd935f497f2

    SHA256

    cb8aae1de50b2c23d91ccbe845127a86f583b579f382a0a82357c89a3edbf339

    SHA512

    f0ecacb9ebc6b3831b50681a199e8e743ca44107678e15af0bfc86fd8746052df76d34967f98ef2ebc1c0b76957f3595d9ca60a637ad6eaaeeecabda4ef9d74e

  • memory/2724-132-0x00000154B8540000-0x00000154B8550000-memory.dmp

    Filesize

    64KB

  • memory/2724-133-0x00000154B85A0000-0x00000154B85B0000-memory.dmp

    Filesize

    64KB

  • memory/2724-134-0x00000154BB2C0000-0x00000154BB2C4000-memory.dmp

    Filesize

    16KB