Analysis
-
max time kernel
137s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
12-02-2022 04:16
Static task
static1
Behavioral task
behavioral1
Sample
15a47fcc690af040d2bafd78861dace418ada468a8006b5298a216c41be507f2.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
15a47fcc690af040d2bafd78861dace418ada468a8006b5298a216c41be507f2.exe
Resource
win10v2004-en-20220113
General
-
Target
15a47fcc690af040d2bafd78861dace418ada468a8006b5298a216c41be507f2.exe
-
Size
89KB
-
MD5
723a2cf8e25f0b74dff1712d2b29fce0
-
SHA1
b9ddb6c4e06751c8b360f3bd7191505b5c3e6e07
-
SHA256
15a47fcc690af040d2bafd78861dace418ada468a8006b5298a216c41be507f2
-
SHA512
69b3ea2b2ae55aa1d5a022145e8b9123aa8fa7efff84a9f408023281a8cb61e3c3ba2ba0a9d6d606905461cd3aa64fd2559ce210e1e550964ac05fe539def311
Malware Config
Signatures
-
Sakula Payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula -
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 1700 MediaCenter.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
15a47fcc690af040d2bafd78861dace418ada468a8006b5298a216c41be507f2.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 15a47fcc690af040d2bafd78861dace418ada468a8006b5298a216c41be507f2.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
15a47fcc690af040d2bafd78861dace418ada468a8006b5298a216c41be507f2.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 15a47fcc690af040d2bafd78861dace418ada468a8006b5298a216c41be507f2.exe -
Drops file in Windows directory 8 IoCs
Processes:
svchost.exeTiWorker.exedescription ioc process File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe File opened for modification C:\Windows\WinSxS\pending.xml TiWorker.exe File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
svchost.exe15a47fcc690af040d2bafd78861dace418ada468a8006b5298a216c41be507f2.exeTiWorker.exedescription pid process Token: SeShutdownPrivilege 1932 svchost.exe Token: SeCreatePagefilePrivilege 1932 svchost.exe Token: SeShutdownPrivilege 1932 svchost.exe Token: SeCreatePagefilePrivilege 1932 svchost.exe Token: SeShutdownPrivilege 1932 svchost.exe Token: SeCreatePagefilePrivilege 1932 svchost.exe Token: SeIncBasePriorityPrivilege 3972 15a47fcc690af040d2bafd78861dace418ada468a8006b5298a216c41be507f2.exe Token: SeSecurityPrivilege 4396 TiWorker.exe Token: SeRestorePrivilege 4396 TiWorker.exe Token: SeBackupPrivilege 4396 TiWorker.exe Token: SeBackupPrivilege 4396 TiWorker.exe Token: SeRestorePrivilege 4396 TiWorker.exe Token: SeSecurityPrivilege 4396 TiWorker.exe Token: SeBackupPrivilege 4396 TiWorker.exe Token: SeRestorePrivilege 4396 TiWorker.exe Token: SeSecurityPrivilege 4396 TiWorker.exe Token: SeBackupPrivilege 4396 TiWorker.exe Token: SeRestorePrivilege 4396 TiWorker.exe Token: SeSecurityPrivilege 4396 TiWorker.exe Token: SeBackupPrivilege 4396 TiWorker.exe Token: SeRestorePrivilege 4396 TiWorker.exe Token: SeSecurityPrivilege 4396 TiWorker.exe Token: SeBackupPrivilege 4396 TiWorker.exe Token: SeRestorePrivilege 4396 TiWorker.exe Token: SeSecurityPrivilege 4396 TiWorker.exe Token: SeBackupPrivilege 4396 TiWorker.exe Token: SeRestorePrivilege 4396 TiWorker.exe Token: SeSecurityPrivilege 4396 TiWorker.exe Token: SeBackupPrivilege 4396 TiWorker.exe Token: SeRestorePrivilege 4396 TiWorker.exe Token: SeSecurityPrivilege 4396 TiWorker.exe Token: SeBackupPrivilege 4396 TiWorker.exe Token: SeRestorePrivilege 4396 TiWorker.exe Token: SeSecurityPrivilege 4396 TiWorker.exe Token: SeBackupPrivilege 4396 TiWorker.exe Token: SeRestorePrivilege 4396 TiWorker.exe Token: SeSecurityPrivilege 4396 TiWorker.exe Token: SeBackupPrivilege 4396 TiWorker.exe Token: SeRestorePrivilege 4396 TiWorker.exe Token: SeSecurityPrivilege 4396 TiWorker.exe Token: SeBackupPrivilege 4396 TiWorker.exe Token: SeRestorePrivilege 4396 TiWorker.exe Token: SeSecurityPrivilege 4396 TiWorker.exe Token: SeBackupPrivilege 4396 TiWorker.exe Token: SeRestorePrivilege 4396 TiWorker.exe Token: SeSecurityPrivilege 4396 TiWorker.exe Token: SeBackupPrivilege 4396 TiWorker.exe Token: SeRestorePrivilege 4396 TiWorker.exe Token: SeSecurityPrivilege 4396 TiWorker.exe Token: SeBackupPrivilege 4396 TiWorker.exe Token: SeRestorePrivilege 4396 TiWorker.exe Token: SeSecurityPrivilege 4396 TiWorker.exe Token: SeBackupPrivilege 4396 TiWorker.exe Token: SeRestorePrivilege 4396 TiWorker.exe Token: SeSecurityPrivilege 4396 TiWorker.exe Token: SeBackupPrivilege 4396 TiWorker.exe Token: SeRestorePrivilege 4396 TiWorker.exe Token: SeSecurityPrivilege 4396 TiWorker.exe Token: SeBackupPrivilege 4396 TiWorker.exe Token: SeRestorePrivilege 4396 TiWorker.exe Token: SeSecurityPrivilege 4396 TiWorker.exe Token: SeBackupPrivilege 4396 TiWorker.exe Token: SeRestorePrivilege 4396 TiWorker.exe Token: SeSecurityPrivilege 4396 TiWorker.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
15a47fcc690af040d2bafd78861dace418ada468a8006b5298a216c41be507f2.execmd.exedescription pid process target process PID 3972 wrote to memory of 1700 3972 15a47fcc690af040d2bafd78861dace418ada468a8006b5298a216c41be507f2.exe MediaCenter.exe PID 3972 wrote to memory of 1700 3972 15a47fcc690af040d2bafd78861dace418ada468a8006b5298a216c41be507f2.exe MediaCenter.exe PID 3972 wrote to memory of 1700 3972 15a47fcc690af040d2bafd78861dace418ada468a8006b5298a216c41be507f2.exe MediaCenter.exe PID 3972 wrote to memory of 4276 3972 15a47fcc690af040d2bafd78861dace418ada468a8006b5298a216c41be507f2.exe cmd.exe PID 3972 wrote to memory of 4276 3972 15a47fcc690af040d2bafd78861dace418ada468a8006b5298a216c41be507f2.exe cmd.exe PID 3972 wrote to memory of 4276 3972 15a47fcc690af040d2bafd78861dace418ada468a8006b5298a216c41be507f2.exe cmd.exe PID 4276 wrote to memory of 4324 4276 cmd.exe PING.EXE PID 4276 wrote to memory of 4324 4276 cmd.exe PING.EXE PID 4276 wrote to memory of 4324 4276 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\15a47fcc690af040d2bafd78861dace418ada468a8006b5298a216c41be507f2.exe"C:\Users\Admin\AppData\Local\Temp\15a47fcc690af040d2bafd78861dace418ada468a8006b5298a216c41be507f2.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:1700 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\15a47fcc690af040d2bafd78861dace418ada468a8006b5298a216c41be507f2.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:4324
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1932
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4396
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
3e0cfc1a7bdbebb3dc54b593c2764b16
SHA16b5146424fbb1066b4f0af3daa39a1d6604bea4c
SHA2566fae62a6d0d2384121d50569a3a51496dd6e6d9735c138798a9b4c6314084d97
SHA512a8a4481976c1a99b0b0510b23d13e40f5df325c92905096da4abcf2b96a21425a44d7dc0ba424309a20b4940cee50de73e997a1fdb25294294c419ee2260d430
-
MD5
3e0cfc1a7bdbebb3dc54b593c2764b16
SHA16b5146424fbb1066b4f0af3daa39a1d6604bea4c
SHA2566fae62a6d0d2384121d50569a3a51496dd6e6d9735c138798a9b4c6314084d97
SHA512a8a4481976c1a99b0b0510b23d13e40f5df325c92905096da4abcf2b96a21425a44d7dc0ba424309a20b4940cee50de73e997a1fdb25294294c419ee2260d430