Analysis
-
max time kernel
152s -
max time network
161s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
12-02-2022 05:30
Static task
static1
Behavioral task
behavioral1
Sample
12837d0eef0051c204551e00dbd7de0abddb390c480fb423cd4806dfadd5c41d.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
12837d0eef0051c204551e00dbd7de0abddb390c480fb423cd4806dfadd5c41d.exe
Resource
win10v2004-en-20220113
General
-
Target
12837d0eef0051c204551e00dbd7de0abddb390c480fb423cd4806dfadd5c41d.exe
-
Size
216KB
-
MD5
c9e9350dc5f7a16284b3c9249674da44
-
SHA1
c0e068dfeaa1db243356ed8e24c487a99a8aa6c7
-
SHA256
12837d0eef0051c204551e00dbd7de0abddb390c480fb423cd4806dfadd5c41d
-
SHA512
b8727566ed6891b5dd1351116e16cce1234d9111f64af36657ee80d74424a63197ffb6f93c3d036d8e2ce4be765be9951a622d19c18dd5b2bdf65e250fc0d344
Malware Config
Signatures
-
Sakula Payload 4 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula behavioral1/memory/1540-58-0x0000000000400000-0x0000000000420000-memory.dmp family_sakula behavioral1/memory/1680-59-0x0000000000400000-0x0000000000420000-memory.dmp family_sakula -
suricata: ET MALWARE SUSPICIOUS UA (iexplore)
suricata: ET MALWARE SUSPICIOUS UA (iexplore)
-
suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1
suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1
-
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 1680 MediaCenter.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1308 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
12837d0eef0051c204551e00dbd7de0abddb390c480fb423cd4806dfadd5c41d.exepid process 1540 12837d0eef0051c204551e00dbd7de0abddb390c480fb423cd4806dfadd5c41d.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
12837d0eef0051c204551e00dbd7de0abddb390c480fb423cd4806dfadd5c41d.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 12837d0eef0051c204551e00dbd7de0abddb390c480fb423cd4806dfadd5c41d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
12837d0eef0051c204551e00dbd7de0abddb390c480fb423cd4806dfadd5c41d.exedescription pid process Token: SeIncBasePriorityPrivilege 1540 12837d0eef0051c204551e00dbd7de0abddb390c480fb423cd4806dfadd5c41d.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
12837d0eef0051c204551e00dbd7de0abddb390c480fb423cd4806dfadd5c41d.execmd.exedescription pid process target process PID 1540 wrote to memory of 1680 1540 12837d0eef0051c204551e00dbd7de0abddb390c480fb423cd4806dfadd5c41d.exe MediaCenter.exe PID 1540 wrote to memory of 1680 1540 12837d0eef0051c204551e00dbd7de0abddb390c480fb423cd4806dfadd5c41d.exe MediaCenter.exe PID 1540 wrote to memory of 1680 1540 12837d0eef0051c204551e00dbd7de0abddb390c480fb423cd4806dfadd5c41d.exe MediaCenter.exe PID 1540 wrote to memory of 1680 1540 12837d0eef0051c204551e00dbd7de0abddb390c480fb423cd4806dfadd5c41d.exe MediaCenter.exe PID 1540 wrote to memory of 1308 1540 12837d0eef0051c204551e00dbd7de0abddb390c480fb423cd4806dfadd5c41d.exe cmd.exe PID 1540 wrote to memory of 1308 1540 12837d0eef0051c204551e00dbd7de0abddb390c480fb423cd4806dfadd5c41d.exe cmd.exe PID 1540 wrote to memory of 1308 1540 12837d0eef0051c204551e00dbd7de0abddb390c480fb423cd4806dfadd5c41d.exe cmd.exe PID 1540 wrote to memory of 1308 1540 12837d0eef0051c204551e00dbd7de0abddb390c480fb423cd4806dfadd5c41d.exe cmd.exe PID 1308 wrote to memory of 1996 1308 cmd.exe PING.EXE PID 1308 wrote to memory of 1996 1308 cmd.exe PING.EXE PID 1308 wrote to memory of 1996 1308 cmd.exe PING.EXE PID 1308 wrote to memory of 1996 1308 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\12837d0eef0051c204551e00dbd7de0abddb390c480fb423cd4806dfadd5c41d.exe"C:\Users\Admin\AppData\Local\Temp\12837d0eef0051c204551e00dbd7de0abddb390c480fb423cd4806dfadd5c41d.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:1680 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\12837d0eef0051c204551e00dbd7de0abddb390c480fb423cd4806dfadd5c41d.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1996
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
1112e305d5ab5c921fbe1e4637f8a5b2
SHA19f44a3816ceb29d434aa331c026bb80781604f80
SHA256d189d1a5176e14aca5c388f3f01fcf2d6fde47488b073fb703e1a084aa02423c
SHA512ade59402a2b8902e2cec7cebe796a6a9de59182dd241f9c66237066c10ce92a7aefc8ae0595a3b5bb4a38464ea1dad04bcbc2e6576ce45c39cf91d0e52b995ff
-
MD5
1112e305d5ab5c921fbe1e4637f8a5b2
SHA19f44a3816ceb29d434aa331c026bb80781604f80
SHA256d189d1a5176e14aca5c388f3f01fcf2d6fde47488b073fb703e1a084aa02423c
SHA512ade59402a2b8902e2cec7cebe796a6a9de59182dd241f9c66237066c10ce92a7aefc8ae0595a3b5bb4a38464ea1dad04bcbc2e6576ce45c39cf91d0e52b995ff