Analysis

  • max time kernel
    121s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    12-02-2022 05:20

General

  • Target

    130387b2e8d274245d926e0070bb8c0be41841a1036087dcb99bbff4c5863b9b.exe

  • Size

    58KB

  • MD5

    53dc01c306e0f1cef156720e9cdf4047

  • SHA1

    294494fa31d05277977e82c065b0c1765c71fe03

  • SHA256

    130387b2e8d274245d926e0070bb8c0be41841a1036087dcb99bbff4c5863b9b

  • SHA512

    d707aaffbbb4e13f2a8c91afedd17753eb36b3a1e42bf5c9bc228ce4409b29fd5ae8878897e035d9e62065b6fcc1904cbc6500f72bbf2e73cb4e07a0e6bce581

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\130387b2e8d274245d926e0070bb8c0be41841a1036087dcb99bbff4c5863b9b.exe
    "C:\Users\Admin\AppData\Local\Temp\130387b2e8d274245d926e0070bb8c0be41841a1036087dcb99bbff4c5863b9b.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1624
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:1220
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\130387b2e8d274245d926e0070bb8c0be41841a1036087dcb99bbff4c5863b9b.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:1844
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:1300

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    255bbc96a618550d7dcf3768dca3dacd

    SHA1

    529d2b3cee08efc2bb9e1108bcac8ffdc4777317

    SHA256

    9f6a2e31577bef245ab24c605719b6ba5dca4d416bd97593d48bf50624da3fda

    SHA512

    29c36e6162b42615c1b7ea142592b4fbf4f5d390b8c743b3f6784040f29f6a4c94e0e97776d1b107401f46a3ed0f366501e7f095280c595154edf27721975cde

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    255bbc96a618550d7dcf3768dca3dacd

    SHA1

    529d2b3cee08efc2bb9e1108bcac8ffdc4777317

    SHA256

    9f6a2e31577bef245ab24c605719b6ba5dca4d416bd97593d48bf50624da3fda

    SHA512

    29c36e6162b42615c1b7ea142592b4fbf4f5d390b8c743b3f6784040f29f6a4c94e0e97776d1b107401f46a3ed0f366501e7f095280c595154edf27721975cde

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    255bbc96a618550d7dcf3768dca3dacd

    SHA1

    529d2b3cee08efc2bb9e1108bcac8ffdc4777317

    SHA256

    9f6a2e31577bef245ab24c605719b6ba5dca4d416bd97593d48bf50624da3fda

    SHA512

    29c36e6162b42615c1b7ea142592b4fbf4f5d390b8c743b3f6784040f29f6a4c94e0e97776d1b107401f46a3ed0f366501e7f095280c595154edf27721975cde

  • memory/1624-54-0x0000000076C61000-0x0000000076C63000-memory.dmp

    Filesize

    8KB