Analysis

  • max time kernel
    158s
  • max time network
    181s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    12-02-2022 04:12

General

  • Target

    15ca9bb365e6598054bc7932a77f1fd8bd43655917b8a272cea3db2d6b6e8320.exe

  • Size

    150KB

  • MD5

    deb0a1ec34ad3607d85b38b8a634da7e

  • SHA1

    695319869bf475b0d1abc37922cfb96c3047fd28

  • SHA256

    15ca9bb365e6598054bc7932a77f1fd8bd43655917b8a272cea3db2d6b6e8320

  • SHA512

    f1e95a9e8b86c1da7eb77391f08d57585f3ba40c99bcbfbd2d42f079740c4233318c2776a516fabdff47e3be5df315919a4304290ecaafae15ccb89e3fa2f648

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Sakula Payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\15ca9bb365e6598054bc7932a77f1fd8bd43655917b8a272cea3db2d6b6e8320.exe
    "C:\Users\Admin\AppData\Local\Temp\15ca9bb365e6598054bc7932a77f1fd8bd43655917b8a272cea3db2d6b6e8320.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1572
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:1516
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\15ca9bb365e6598054bc7932a77f1fd8bd43655917b8a272cea3db2d6b6e8320.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:396
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:956

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    ccb89bd95b79823f201df025f584b7f4

    SHA1

    2fb43de0844ca5eb4ae0aa62e9c044b24125812e

    SHA256

    a2627908d23f7446883bd0bc7324be92420bb6c13dd44c1e24e01fbc7d42e1d8

    SHA512

    d914ac9d4ccc200a284d6b65ac4df79095efaa9cf145c83686702b25eb0e928d7d41fee752415daee8c9526463683ec3e380be42b1aa0c3bab84d0efc838f4e9

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    ccb89bd95b79823f201df025f584b7f4

    SHA1

    2fb43de0844ca5eb4ae0aa62e9c044b24125812e

    SHA256

    a2627908d23f7446883bd0bc7324be92420bb6c13dd44c1e24e01fbc7d42e1d8

    SHA512

    d914ac9d4ccc200a284d6b65ac4df79095efaa9cf145c83686702b25eb0e928d7d41fee752415daee8c9526463683ec3e380be42b1aa0c3bab84d0efc838f4e9

  • memory/1572-55-0x0000000075AB1000-0x0000000075AB3000-memory.dmp

    Filesize

    8KB