Analysis
-
max time kernel
120s -
max time network
139s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
12-02-2022 04:48
Static task
static1
Behavioral task
behavioral1
Sample
145a9adc39268e8edf7723e9efaeef40975b4b583aa31f833700a094e6b7b715.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
145a9adc39268e8edf7723e9efaeef40975b4b583aa31f833700a094e6b7b715.exe
Resource
win10v2004-en-20220112
General
-
Target
145a9adc39268e8edf7723e9efaeef40975b4b583aa31f833700a094e6b7b715.exe
-
Size
99KB
-
MD5
bce00095a8858570af9799dda2429fef
-
SHA1
c4cb9a6fb8e18fddd33140f667293b46e349df93
-
SHA256
145a9adc39268e8edf7723e9efaeef40975b4b583aa31f833700a094e6b7b715
-
SHA512
c2703e7574df1344b79c9d766919fb93660b2bb466f7ff9dbf77c39644e8d44752b5a67babd70d9828ea165a6b4f89c9af9a91c7ed51aedc1f9279673d60ed84
Malware Config
Signatures
-
Sakula Payload 3 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula -
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 1628 MediaCenter.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 396 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
145a9adc39268e8edf7723e9efaeef40975b4b583aa31f833700a094e6b7b715.exepid process 1848 145a9adc39268e8edf7723e9efaeef40975b4b583aa31f833700a094e6b7b715.exe 1848 145a9adc39268e8edf7723e9efaeef40975b4b583aa31f833700a094e6b7b715.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
145a9adc39268e8edf7723e9efaeef40975b4b583aa31f833700a094e6b7b715.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 145a9adc39268e8edf7723e9efaeef40975b4b583aa31f833700a094e6b7b715.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
145a9adc39268e8edf7723e9efaeef40975b4b583aa31f833700a094e6b7b715.exedescription pid process Token: SeIncBasePriorityPrivilege 1848 145a9adc39268e8edf7723e9efaeef40975b4b583aa31f833700a094e6b7b715.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
145a9adc39268e8edf7723e9efaeef40975b4b583aa31f833700a094e6b7b715.execmd.exedescription pid process target process PID 1848 wrote to memory of 1628 1848 145a9adc39268e8edf7723e9efaeef40975b4b583aa31f833700a094e6b7b715.exe MediaCenter.exe PID 1848 wrote to memory of 1628 1848 145a9adc39268e8edf7723e9efaeef40975b4b583aa31f833700a094e6b7b715.exe MediaCenter.exe PID 1848 wrote to memory of 1628 1848 145a9adc39268e8edf7723e9efaeef40975b4b583aa31f833700a094e6b7b715.exe MediaCenter.exe PID 1848 wrote to memory of 1628 1848 145a9adc39268e8edf7723e9efaeef40975b4b583aa31f833700a094e6b7b715.exe MediaCenter.exe PID 1848 wrote to memory of 396 1848 145a9adc39268e8edf7723e9efaeef40975b4b583aa31f833700a094e6b7b715.exe cmd.exe PID 1848 wrote to memory of 396 1848 145a9adc39268e8edf7723e9efaeef40975b4b583aa31f833700a094e6b7b715.exe cmd.exe PID 1848 wrote to memory of 396 1848 145a9adc39268e8edf7723e9efaeef40975b4b583aa31f833700a094e6b7b715.exe cmd.exe PID 1848 wrote to memory of 396 1848 145a9adc39268e8edf7723e9efaeef40975b4b583aa31f833700a094e6b7b715.exe cmd.exe PID 396 wrote to memory of 1972 396 cmd.exe PING.EXE PID 396 wrote to memory of 1972 396 cmd.exe PING.EXE PID 396 wrote to memory of 1972 396 cmd.exe PING.EXE PID 396 wrote to memory of 1972 396 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\145a9adc39268e8edf7723e9efaeef40975b4b583aa31f833700a094e6b7b715.exe"C:\Users\Admin\AppData\Local\Temp\145a9adc39268e8edf7723e9efaeef40975b4b583aa31f833700a094e6b7b715.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:1628 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\145a9adc39268e8edf7723e9efaeef40975b4b583aa31f833700a094e6b7b715.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1972
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
9a498ecb994dd883f9aaf98e9426e586
SHA1a54de39a882ad76bcc965496b69b1734a4dc3079
SHA256447258c65d3bcdaf7740a6c8c875f396df75384d6db7b9edb7c8a1ffdc6675a5
SHA5121851c53967fd4b8f56d6853030636dc395e0383b404722bd112f35015a5c9c25f94b8a8afad7b17884a2327a3239af403903661ca7422dd29dce014a41a8440f
-
MD5
9a498ecb994dd883f9aaf98e9426e586
SHA1a54de39a882ad76bcc965496b69b1734a4dc3079
SHA256447258c65d3bcdaf7740a6c8c875f396df75384d6db7b9edb7c8a1ffdc6675a5
SHA5121851c53967fd4b8f56d6853030636dc395e0383b404722bd112f35015a5c9c25f94b8a8afad7b17884a2327a3239af403903661ca7422dd29dce014a41a8440f
-
MD5
9a498ecb994dd883f9aaf98e9426e586
SHA1a54de39a882ad76bcc965496b69b1734a4dc3079
SHA256447258c65d3bcdaf7740a6c8c875f396df75384d6db7b9edb7c8a1ffdc6675a5
SHA5121851c53967fd4b8f56d6853030636dc395e0383b404722bd112f35015a5c9c25f94b8a8afad7b17884a2327a3239af403903661ca7422dd29dce014a41a8440f