Analysis
-
max time kernel
133s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
12-02-2022 04:22
Static task
static1
Behavioral task
behavioral1
Sample
156a712ffc3a1f28ee30c76d40af5c67dc769fb9634749bd8746f6a8ceff02c6.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
156a712ffc3a1f28ee30c76d40af5c67dc769fb9634749bd8746f6a8ceff02c6.exe
Resource
win10v2004-en-20220113
General
-
Target
156a712ffc3a1f28ee30c76d40af5c67dc769fb9634749bd8746f6a8ceff02c6.exe
-
Size
80KB
-
MD5
f1f5b75bfb2565bd6e97d305d2ade120
-
SHA1
48eb536870789537d57eb63ab3898bd9f1aa8451
-
SHA256
156a712ffc3a1f28ee30c76d40af5c67dc769fb9634749bd8746f6a8ceff02c6
-
SHA512
0dc54d35e294347895198d1b6ec9d42cd50fefb4f1f2a70dd520eabf7e2f0cecd852beda98ab9f2519eb1250ce8fd6b55b6bd20f4e479e90664d89da39ee3d66
Malware Config
Signatures
-
Sakula Payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula -
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 4696 MediaCenter.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
156a712ffc3a1f28ee30c76d40af5c67dc769fb9634749bd8746f6a8ceff02c6.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 156a712ffc3a1f28ee30c76d40af5c67dc769fb9634749bd8746f6a8ceff02c6.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
156a712ffc3a1f28ee30c76d40af5c67dc769fb9634749bd8746f6a8ceff02c6.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 156a712ffc3a1f28ee30c76d40af5c67dc769fb9634749bd8746f6a8ceff02c6.exe -
Drops file in Windows directory 8 IoCs
Processes:
TiWorker.exesvchost.exedescription ioc process File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe File opened for modification C:\Windows\WinSxS\pending.xml TiWorker.exe File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
156a712ffc3a1f28ee30c76d40af5c67dc769fb9634749bd8746f6a8ceff02c6.exesvchost.exeTiWorker.exedescription pid process Token: SeIncBasePriorityPrivilege 3336 156a712ffc3a1f28ee30c76d40af5c67dc769fb9634749bd8746f6a8ceff02c6.exe Token: SeShutdownPrivilege 4432 svchost.exe Token: SeCreatePagefilePrivilege 4432 svchost.exe Token: SeShutdownPrivilege 4432 svchost.exe Token: SeCreatePagefilePrivilege 4432 svchost.exe Token: SeShutdownPrivilege 4432 svchost.exe Token: SeCreatePagefilePrivilege 4432 svchost.exe Token: SeSecurityPrivilege 896 TiWorker.exe Token: SeRestorePrivilege 896 TiWorker.exe Token: SeBackupPrivilege 896 TiWorker.exe Token: SeBackupPrivilege 896 TiWorker.exe Token: SeRestorePrivilege 896 TiWorker.exe Token: SeSecurityPrivilege 896 TiWorker.exe Token: SeBackupPrivilege 896 TiWorker.exe Token: SeRestorePrivilege 896 TiWorker.exe Token: SeSecurityPrivilege 896 TiWorker.exe Token: SeBackupPrivilege 896 TiWorker.exe Token: SeRestorePrivilege 896 TiWorker.exe Token: SeSecurityPrivilege 896 TiWorker.exe Token: SeBackupPrivilege 896 TiWorker.exe Token: SeRestorePrivilege 896 TiWorker.exe Token: SeSecurityPrivilege 896 TiWorker.exe Token: SeBackupPrivilege 896 TiWorker.exe Token: SeRestorePrivilege 896 TiWorker.exe Token: SeSecurityPrivilege 896 TiWorker.exe Token: SeBackupPrivilege 896 TiWorker.exe Token: SeRestorePrivilege 896 TiWorker.exe Token: SeSecurityPrivilege 896 TiWorker.exe Token: SeBackupPrivilege 896 TiWorker.exe Token: SeRestorePrivilege 896 TiWorker.exe Token: SeSecurityPrivilege 896 TiWorker.exe Token: SeBackupPrivilege 896 TiWorker.exe Token: SeRestorePrivilege 896 TiWorker.exe Token: SeSecurityPrivilege 896 TiWorker.exe Token: SeBackupPrivilege 896 TiWorker.exe Token: SeRestorePrivilege 896 TiWorker.exe Token: SeSecurityPrivilege 896 TiWorker.exe Token: SeBackupPrivilege 896 TiWorker.exe Token: SeRestorePrivilege 896 TiWorker.exe Token: SeSecurityPrivilege 896 TiWorker.exe Token: SeBackupPrivilege 896 TiWorker.exe Token: SeRestorePrivilege 896 TiWorker.exe Token: SeSecurityPrivilege 896 TiWorker.exe Token: SeBackupPrivilege 896 TiWorker.exe Token: SeRestorePrivilege 896 TiWorker.exe Token: SeSecurityPrivilege 896 TiWorker.exe Token: SeBackupPrivilege 896 TiWorker.exe Token: SeRestorePrivilege 896 TiWorker.exe Token: SeSecurityPrivilege 896 TiWorker.exe Token: SeBackupPrivilege 896 TiWorker.exe Token: SeRestorePrivilege 896 TiWorker.exe Token: SeSecurityPrivilege 896 TiWorker.exe Token: SeBackupPrivilege 896 TiWorker.exe Token: SeRestorePrivilege 896 TiWorker.exe Token: SeSecurityPrivilege 896 TiWorker.exe Token: SeBackupPrivilege 896 TiWorker.exe Token: SeRestorePrivilege 896 TiWorker.exe Token: SeSecurityPrivilege 896 TiWorker.exe Token: SeBackupPrivilege 896 TiWorker.exe Token: SeRestorePrivilege 896 TiWorker.exe Token: SeSecurityPrivilege 896 TiWorker.exe Token: SeBackupPrivilege 896 TiWorker.exe Token: SeRestorePrivilege 896 TiWorker.exe Token: SeSecurityPrivilege 896 TiWorker.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
156a712ffc3a1f28ee30c76d40af5c67dc769fb9634749bd8746f6a8ceff02c6.execmd.exedescription pid process target process PID 3336 wrote to memory of 4696 3336 156a712ffc3a1f28ee30c76d40af5c67dc769fb9634749bd8746f6a8ceff02c6.exe MediaCenter.exe PID 3336 wrote to memory of 4696 3336 156a712ffc3a1f28ee30c76d40af5c67dc769fb9634749bd8746f6a8ceff02c6.exe MediaCenter.exe PID 3336 wrote to memory of 4696 3336 156a712ffc3a1f28ee30c76d40af5c67dc769fb9634749bd8746f6a8ceff02c6.exe MediaCenter.exe PID 3336 wrote to memory of 208 3336 156a712ffc3a1f28ee30c76d40af5c67dc769fb9634749bd8746f6a8ceff02c6.exe cmd.exe PID 3336 wrote to memory of 208 3336 156a712ffc3a1f28ee30c76d40af5c67dc769fb9634749bd8746f6a8ceff02c6.exe cmd.exe PID 3336 wrote to memory of 208 3336 156a712ffc3a1f28ee30c76d40af5c67dc769fb9634749bd8746f6a8ceff02c6.exe cmd.exe PID 208 wrote to memory of 3772 208 cmd.exe PING.EXE PID 208 wrote to memory of 3772 208 cmd.exe PING.EXE PID 208 wrote to memory of 3772 208 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\156a712ffc3a1f28ee30c76d40af5c67dc769fb9634749bd8746f6a8ceff02c6.exe"C:\Users\Admin\AppData\Local\Temp\156a712ffc3a1f28ee30c76d40af5c67dc769fb9634749bd8746f6a8ceff02c6.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:4696 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\156a712ffc3a1f28ee30c76d40af5c67dc769fb9634749bd8746f6a8ceff02c6.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:3772
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4432
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:896
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
9d7e2d59ec314c0d1e568a6df8103964
SHA166635ce231d7ff934663623b88ac9c669de48b8e
SHA2567d8891a97552d9cb73485700d69d0f54e6cca102d6ced33f0a693c40b2794699
SHA512fddaa3fc91f853016e4d0a28c0e5726c2c06bba65f1bb69188ce1a2e2c034315a08ba8269ed34122a99141ce72ac4750f1222ee4bdd14d74240473513ca2113d
-
MD5
9d7e2d59ec314c0d1e568a6df8103964
SHA166635ce231d7ff934663623b88ac9c669de48b8e
SHA2567d8891a97552d9cb73485700d69d0f54e6cca102d6ced33f0a693c40b2794699
SHA512fddaa3fc91f853016e4d0a28c0e5726c2c06bba65f1bb69188ce1a2e2c034315a08ba8269ed34122a99141ce72ac4750f1222ee4bdd14d74240473513ca2113d