Analysis

  • max time kernel
    156s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    12-02-2022 05:30

General

  • Target

    128e76c246ca375a451b75a087d5f9686136ea660d58bc5c9d23a13b3d92807f.exe

  • Size

    192KB

  • MD5

    b615d19df3bc6d4b6e286472f6c8dd05

  • SHA1

    9b6a64024ed7de64c314d2a7bb587946f5fa357e

  • SHA256

    128e76c246ca375a451b75a087d5f9686136ea660d58bc5c9d23a13b3d92807f

  • SHA512

    26f1cf3587e382802d479902d4328db29cba84d384a8d1c5b11c6e35ab7c89ca7d44c95a6adcf1b9694a4bcb1e7bd6e8fc175c8abf982b65172cba9499ef3c1c

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Sakula Payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\128e76c246ca375a451b75a087d5f9686136ea660d58bc5c9d23a13b3d92807f.exe
    "C:\Users\Admin\AppData\Local\Temp\128e76c246ca375a451b75a087d5f9686136ea660d58bc5c9d23a13b3d92807f.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4504
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:1292
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\128e76c246ca375a451b75a087d5f9686136ea660d58bc5c9d23a13b3d92807f.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2504
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:2272
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:4608
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:680

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    07adf90265c8277a659433699b6b6a96

    SHA1

    f3885c72917b9c9d26d8ed83cf27ba4b15c1762e

    SHA256

    aa58daf90897e981ccc6dc3e4acba49e18fb1cff39ab0777245d8cabf56b0129

    SHA512

    1c27f2cc09a4be603d08171dd875bef95704ccd9d7cf8b5cb35c44bdde40e1cf52bd46428e886c15d383a6cae350108134c8dc826800fe7a0adb25e7a003e954

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    07adf90265c8277a659433699b6b6a96

    SHA1

    f3885c72917b9c9d26d8ed83cf27ba4b15c1762e

    SHA256

    aa58daf90897e981ccc6dc3e4acba49e18fb1cff39ab0777245d8cabf56b0129

    SHA512

    1c27f2cc09a4be603d08171dd875bef95704ccd9d7cf8b5cb35c44bdde40e1cf52bd46428e886c15d383a6cae350108134c8dc826800fe7a0adb25e7a003e954

  • memory/4608-132-0x000002B823D80000-0x000002B823D90000-memory.dmp

    Filesize

    64KB

  • memory/4608-133-0x000002B824560000-0x000002B824570000-memory.dmp

    Filesize

    64KB

  • memory/4608-134-0x000002B827160000-0x000002B827164000-memory.dmp

    Filesize

    16KB