Analysis

  • max time kernel
    163s
  • max time network
    170s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    12-02-2022 04:17

General

  • Target

    1591561d3896de7a821fdc18715334d6bbdfaaffb53e9bcd141484cbf9f25b06.exe

  • Size

    60KB

  • MD5

    21647921c9d30dcdc96c4d81dd6b49cb

  • SHA1

    de052a18f528b75f33f4ccf804302cf616c2bc0d

  • SHA256

    1591561d3896de7a821fdc18715334d6bbdfaaffb53e9bcd141484cbf9f25b06

  • SHA512

    a128fed5d634daec1f74f07cf40ed7175c93f993bb5c209b8006f58197df861b7302eba415ed7eaf39f662f34bb743e274c2db586f19aba1d64980f3aeb2a0d8

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 50 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1591561d3896de7a821fdc18715334d6bbdfaaffb53e9bcd141484cbf9f25b06.exe
    "C:\Users\Admin\AppData\Local\Temp\1591561d3896de7a821fdc18715334d6bbdfaaffb53e9bcd141484cbf9f25b06.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3776
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:2720
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\1591561d3896de7a821fdc18715334d6bbdfaaffb53e9bcd141484cbf9f25b06.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4128
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:4184
  • C:\Windows\system32\MusNotifyIcon.exe
    %systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 13
    1⤵
    • Checks processor information in registry
    PID:3028
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k NetworkService -p
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    PID:4216
  • C:\Windows\system32\MusNotifyIcon.exe
    %systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 13
    1⤵
    • Checks processor information in registry
    PID:4240
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:4464

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    f61f3fc16e4d83e26e0dd650febd9564

    SHA1

    b7e79ec1b210e972c587b930381879cf543ab40f

    SHA256

    985df66a1cf0ce04e755f07e4a2fda56a78e03216a545b43d85dd9a94cfd34eb

    SHA512

    eb5ecd643cbb792a72c078e1c6f2f1decafcfac4a2ad949fc3aebd0f53eb6ad7b84d76dd2fe3c72bc59767ab24caa8a2f036916e3732db387312df4034c5b468

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    f61f3fc16e4d83e26e0dd650febd9564

    SHA1

    b7e79ec1b210e972c587b930381879cf543ab40f

    SHA256

    985df66a1cf0ce04e755f07e4a2fda56a78e03216a545b43d85dd9a94cfd34eb

    SHA512

    eb5ecd643cbb792a72c078e1c6f2f1decafcfac4a2ad949fc3aebd0f53eb6ad7b84d76dd2fe3c72bc59767ab24caa8a2f036916e3732db387312df4034c5b468