Analysis
-
max time kernel
144s -
max time network
159s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
12-02-2022 04:16
Static task
static1
Behavioral task
behavioral1
Sample
15a47fcc690af040d2bafd78861dace418ada468a8006b5298a216c41be507f2.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
15a47fcc690af040d2bafd78861dace418ada468a8006b5298a216c41be507f2.exe
Resource
win10v2004-en-20220113
General
-
Target
15a47fcc690af040d2bafd78861dace418ada468a8006b5298a216c41be507f2.exe
-
Size
89KB
-
MD5
723a2cf8e25f0b74dff1712d2b29fce0
-
SHA1
b9ddb6c4e06751c8b360f3bd7191505b5c3e6e07
-
SHA256
15a47fcc690af040d2bafd78861dace418ada468a8006b5298a216c41be507f2
-
SHA512
69b3ea2b2ae55aa1d5a022145e8b9123aa8fa7efff84a9f408023281a8cb61e3c3ba2ba0a9d6d606905461cd3aa64fd2559ce210e1e550964ac05fe539def311
Malware Config
Signatures
-
Sakula Payload 2 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula -
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 948 MediaCenter.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1472 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
15a47fcc690af040d2bafd78861dace418ada468a8006b5298a216c41be507f2.exepid process 732 15a47fcc690af040d2bafd78861dace418ada468a8006b5298a216c41be507f2.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
15a47fcc690af040d2bafd78861dace418ada468a8006b5298a216c41be507f2.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 15a47fcc690af040d2bafd78861dace418ada468a8006b5298a216c41be507f2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
15a47fcc690af040d2bafd78861dace418ada468a8006b5298a216c41be507f2.exedescription pid process Token: SeIncBasePriorityPrivilege 732 15a47fcc690af040d2bafd78861dace418ada468a8006b5298a216c41be507f2.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
15a47fcc690af040d2bafd78861dace418ada468a8006b5298a216c41be507f2.execmd.exedescription pid process target process PID 732 wrote to memory of 948 732 15a47fcc690af040d2bafd78861dace418ada468a8006b5298a216c41be507f2.exe MediaCenter.exe PID 732 wrote to memory of 948 732 15a47fcc690af040d2bafd78861dace418ada468a8006b5298a216c41be507f2.exe MediaCenter.exe PID 732 wrote to memory of 948 732 15a47fcc690af040d2bafd78861dace418ada468a8006b5298a216c41be507f2.exe MediaCenter.exe PID 732 wrote to memory of 948 732 15a47fcc690af040d2bafd78861dace418ada468a8006b5298a216c41be507f2.exe MediaCenter.exe PID 732 wrote to memory of 1472 732 15a47fcc690af040d2bafd78861dace418ada468a8006b5298a216c41be507f2.exe cmd.exe PID 732 wrote to memory of 1472 732 15a47fcc690af040d2bafd78861dace418ada468a8006b5298a216c41be507f2.exe cmd.exe PID 732 wrote to memory of 1472 732 15a47fcc690af040d2bafd78861dace418ada468a8006b5298a216c41be507f2.exe cmd.exe PID 732 wrote to memory of 1472 732 15a47fcc690af040d2bafd78861dace418ada468a8006b5298a216c41be507f2.exe cmd.exe PID 1472 wrote to memory of 1648 1472 cmd.exe PING.EXE PID 1472 wrote to memory of 1648 1472 cmd.exe PING.EXE PID 1472 wrote to memory of 1648 1472 cmd.exe PING.EXE PID 1472 wrote to memory of 1648 1472 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\15a47fcc690af040d2bafd78861dace418ada468a8006b5298a216c41be507f2.exe"C:\Users\Admin\AppData\Local\Temp\15a47fcc690af040d2bafd78861dace418ada468a8006b5298a216c41be507f2.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:948 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\15a47fcc690af040d2bafd78861dace418ada468a8006b5298a216c41be507f2.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1648
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
71ec78ccd6488d23ba24b920d8427b65
SHA1122fcac9f8def0932201867a925df612e0b0f7de
SHA256ae48792d6859c9fd57975fd024994c7bce5a794b403b10f1b6b76521cc8f4672
SHA512ce2a13140de687eb35299a2f00955caa4116afcba882a475960de7d2795586b546b0c0abe41f4022108052c9a2027b4b692dedc0493fa6916cd931ac3a36bfaf
-
MD5
71ec78ccd6488d23ba24b920d8427b65
SHA1122fcac9f8def0932201867a925df612e0b0f7de
SHA256ae48792d6859c9fd57975fd024994c7bce5a794b403b10f1b6b76521cc8f4672
SHA512ce2a13140de687eb35299a2f00955caa4116afcba882a475960de7d2795586b546b0c0abe41f4022108052c9a2027b4b692dedc0493fa6916cd931ac3a36bfaf