Analysis
-
max time kernel
152s -
max time network
162s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
12-02-2022 05:34
Static task
static1
Behavioral task
behavioral1
Sample
124e99b3fb0a69ce98e447085a41db829eca963ce909c741384ee701e1425422.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
124e99b3fb0a69ce98e447085a41db829eca963ce909c741384ee701e1425422.exe
Resource
win10v2004-en-20220112
General
-
Target
124e99b3fb0a69ce98e447085a41db829eca963ce909c741384ee701e1425422.exe
-
Size
176KB
-
MD5
f704eaee3696ea6aa551cb091e883c40
-
SHA1
c6628fa0d6a7b7fee2b37ff9b02c7aa9581057b1
-
SHA256
124e99b3fb0a69ce98e447085a41db829eca963ce909c741384ee701e1425422
-
SHA512
a6edf659f1877a85c7bb63d5def1298949ec518c5d8ebac94db79227eb91ca1cd15c5d7df33a01da5ab1deca6b463ae4d89a38e765e7587abef5149297adf731
Malware Config
Signatures
-
Sakula Payload 4 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula behavioral1/memory/1416-58-0x0000000000400000-0x0000000000420000-memory.dmp family_sakula behavioral1/memory/1892-59-0x0000000000400000-0x0000000000420000-memory.dmp family_sakula -
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 1892 MediaCenter.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 376 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
124e99b3fb0a69ce98e447085a41db829eca963ce909c741384ee701e1425422.exepid process 1416 124e99b3fb0a69ce98e447085a41db829eca963ce909c741384ee701e1425422.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
124e99b3fb0a69ce98e447085a41db829eca963ce909c741384ee701e1425422.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 124e99b3fb0a69ce98e447085a41db829eca963ce909c741384ee701e1425422.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
124e99b3fb0a69ce98e447085a41db829eca963ce909c741384ee701e1425422.exedescription pid process Token: SeIncBasePriorityPrivilege 1416 124e99b3fb0a69ce98e447085a41db829eca963ce909c741384ee701e1425422.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
124e99b3fb0a69ce98e447085a41db829eca963ce909c741384ee701e1425422.execmd.exedescription pid process target process PID 1416 wrote to memory of 1892 1416 124e99b3fb0a69ce98e447085a41db829eca963ce909c741384ee701e1425422.exe MediaCenter.exe PID 1416 wrote to memory of 1892 1416 124e99b3fb0a69ce98e447085a41db829eca963ce909c741384ee701e1425422.exe MediaCenter.exe PID 1416 wrote to memory of 1892 1416 124e99b3fb0a69ce98e447085a41db829eca963ce909c741384ee701e1425422.exe MediaCenter.exe PID 1416 wrote to memory of 1892 1416 124e99b3fb0a69ce98e447085a41db829eca963ce909c741384ee701e1425422.exe MediaCenter.exe PID 1416 wrote to memory of 376 1416 124e99b3fb0a69ce98e447085a41db829eca963ce909c741384ee701e1425422.exe cmd.exe PID 1416 wrote to memory of 376 1416 124e99b3fb0a69ce98e447085a41db829eca963ce909c741384ee701e1425422.exe cmd.exe PID 1416 wrote to memory of 376 1416 124e99b3fb0a69ce98e447085a41db829eca963ce909c741384ee701e1425422.exe cmd.exe PID 1416 wrote to memory of 376 1416 124e99b3fb0a69ce98e447085a41db829eca963ce909c741384ee701e1425422.exe cmd.exe PID 376 wrote to memory of 396 376 cmd.exe PING.EXE PID 376 wrote to memory of 396 376 cmd.exe PING.EXE PID 376 wrote to memory of 396 376 cmd.exe PING.EXE PID 376 wrote to memory of 396 376 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\124e99b3fb0a69ce98e447085a41db829eca963ce909c741384ee701e1425422.exe"C:\Users\Admin\AppData\Local\Temp\124e99b3fb0a69ce98e447085a41db829eca963ce909c741384ee701e1425422.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:1892 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\124e99b3fb0a69ce98e447085a41db829eca963ce909c741384ee701e1425422.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:396
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
bbff5a6bb1b0b1663d896675a85d962f
SHA1d1f18b5ebb8d8f6aeb6241ecc630448a9fc0c20b
SHA25650262007ade92e0b919f10cd51548cf40e3aa06274821a396310b73216237d6e
SHA512f54b97cefdb81929fb463e34dbf2ad71057350cec713b9f9135e10cc2f97083fa03ff89b190f84f61a06850793e18572c2739a4e4ff8ad203548808d15566618
-
MD5
bbff5a6bb1b0b1663d896675a85d962f
SHA1d1f18b5ebb8d8f6aeb6241ecc630448a9fc0c20b
SHA25650262007ade92e0b919f10cd51548cf40e3aa06274821a396310b73216237d6e
SHA512f54b97cefdb81929fb463e34dbf2ad71057350cec713b9f9135e10cc2f97083fa03ff89b190f84f61a06850793e18572c2739a4e4ff8ad203548808d15566618