Analysis

  • max time kernel
    148s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    12-02-2022 05:28

General

  • Target

    12ac35e35ff247d89a35afffe065639ec0c61862d15e79df2361ca61a872aaff.exe

  • Size

    79KB

  • MD5

    52996ba6234d7f7c743a021ef84d6c1e

  • SHA1

    4b4d1f4eed3494d279c9145926da8f97e48024cd

  • SHA256

    12ac35e35ff247d89a35afffe065639ec0c61862d15e79df2361ca61a872aaff

  • SHA512

    ae1cda21d416e1adc0d20b637e647719a199bba868500d62edc8557fa3c2144a314ace01933d735cf5eb2a4ea9f0b79a89df8d4cf6abe810af6de6d74c330c3b

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Sakula Payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\12ac35e35ff247d89a35afffe065639ec0c61862d15e79df2361ca61a872aaff.exe
    "C:\Users\Admin\AppData\Local\Temp\12ac35e35ff247d89a35afffe065639ec0c61862d15e79df2361ca61a872aaff.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1140
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:2020
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\12ac35e35ff247d89a35afffe065639ec0c61862d15e79df2361ca61a872aaff.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3156
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:4152
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2784
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2812

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    d7d6fff87a42be855f1710ae08dc5a24

    SHA1

    11a00da36f050e52f1b83dddada173f8059839ec

    SHA256

    17b8d69444d618c51427820ae1ec5c73a99ae915e1af9451cb5dc230b51aaf15

    SHA512

    10b41842d1067aa861f909c9d62e3828810d8b878c872ebe1e2ce97ee1ab9b4bfde409b4cdb6386ec8cb22d180f8fb33f8054e6a3a1edb9942537c36adc84366

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    d7d6fff87a42be855f1710ae08dc5a24

    SHA1

    11a00da36f050e52f1b83dddada173f8059839ec

    SHA256

    17b8d69444d618c51427820ae1ec5c73a99ae915e1af9451cb5dc230b51aaf15

    SHA512

    10b41842d1067aa861f909c9d62e3828810d8b878c872ebe1e2ce97ee1ab9b4bfde409b4cdb6386ec8cb22d180f8fb33f8054e6a3a1edb9942537c36adc84366

  • memory/2784-132-0x00000251E5F60000-0x00000251E5F70000-memory.dmp

    Filesize

    64KB

  • memory/2784-133-0x00000251E6520000-0x00000251E6530000-memory.dmp

    Filesize

    64KB

  • memory/2784-134-0x00000251E8BC0000-0x00000251E8BC4000-memory.dmp

    Filesize

    16KB