Analysis

  • max time kernel
    155s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    12-02-2022 04:21

General

  • Target

    15730f6481da0ba05002f86ccddd00d0ccdce4a65e8702b4590784850e84943e.exe

  • Size

    36KB

  • MD5

    c81e787a8c97c60470b944bcb80ed88c

  • SHA1

    5f85c6fff679ac44e4c4ffb9ba6bb323e67052ce

  • SHA256

    15730f6481da0ba05002f86ccddd00d0ccdce4a65e8702b4590784850e84943e

  • SHA512

    a6de6db6e2575d45da473d1f6c1a9fa52c3ae80fe6f03fd3409a01e39fd6dc39fa7a2b6579b831dc2131450f0ef8799985e4dbafb4c9f2e2da5317730109fba4

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\15730f6481da0ba05002f86ccddd00d0ccdce4a65e8702b4590784850e84943e.exe
    "C:\Users\Admin\AppData\Local\Temp\15730f6481da0ba05002f86ccddd00d0ccdce4a65e8702b4590784850e84943e.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4800
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:4532
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\15730f6481da0ba05002f86ccddd00d0ccdce4a65e8702b4590784850e84943e.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1144
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:1784
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2156
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:4968

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    673971dc09beae61a4fec558489bae46

    SHA1

    3d3b3d6b702d84eb243bdcac30aebd18b066f737

    SHA256

    afbc565c257ee60e015d48cbbfdd708b96210e6205f768537308c7c9ad66924a

    SHA512

    d42b88ed2bb55784e4859cb28df351adc6800866a5d727b72c6f1e0d6b8943c5dd5d2f2fb14ff6f197ed38bded965f0e3640e94750c94c9150a49b8e1a6f0d31

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    673971dc09beae61a4fec558489bae46

    SHA1

    3d3b3d6b702d84eb243bdcac30aebd18b066f737

    SHA256

    afbc565c257ee60e015d48cbbfdd708b96210e6205f768537308c7c9ad66924a

    SHA512

    d42b88ed2bb55784e4859cb28df351adc6800866a5d727b72c6f1e0d6b8943c5dd5d2f2fb14ff6f197ed38bded965f0e3640e94750c94c9150a49b8e1a6f0d31

  • memory/2156-132-0x00000262DE620000-0x00000262DE630000-memory.dmp

    Filesize

    64KB

  • memory/2156-133-0x00000262DE680000-0x00000262DE690000-memory.dmp

    Filesize

    64KB

  • memory/2156-134-0x00000262E0D50000-0x00000262E0D54000-memory.dmp

    Filesize

    16KB