Analysis

  • max time kernel
    143s
  • max time network
    166s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    12-02-2022 04:50

General

  • Target

    1445dd410bb1eb9cb78c3a48db7a35f63c7aea2a3362e2c0e863cc78eed4b13f.exe

  • Size

    35KB

  • MD5

    bf5cc2eededf22c913f500b744b51bcd

  • SHA1

    5bc6be9aa45ab842edd274f67847814292eda450

  • SHA256

    1445dd410bb1eb9cb78c3a48db7a35f63c7aea2a3362e2c0e863cc78eed4b13f

  • SHA512

    01bdfda49e8181f9513ef083525dfcda239dba7d3960f3aeb8650f258f82169c1146ee1e14f0175a8771f7faef4445a2f2470b82533c8340ccc1df1176f71be3

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1445dd410bb1eb9cb78c3a48db7a35f63c7aea2a3362e2c0e863cc78eed4b13f.exe
    "C:\Users\Admin\AppData\Local\Temp\1445dd410bb1eb9cb78c3a48db7a35f63c7aea2a3362e2c0e863cc78eed4b13f.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:456
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:1544
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\1445dd410bb1eb9cb78c3a48db7a35f63c7aea2a3362e2c0e863cc78eed4b13f.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2852
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:4064
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:3620
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:1640

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    2036faa4d4a81a3644351c3e16a052d5

    SHA1

    25b3029df7a3f76a7c21606d7db28eddd7c8b244

    SHA256

    7531f2307173819b0c079c0827c1cb5f13462c3f556e920e355b3effa966db9e

    SHA512

    fb090f4e9b34e1caf0472b1e83460bcd0645d2acdf2097967f90471b9a5dffa098c52a0686edefbd27c52811ec39f2aa64b56477052d6d894fa081d78bdb2bdb

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    2036faa4d4a81a3644351c3e16a052d5

    SHA1

    25b3029df7a3f76a7c21606d7db28eddd7c8b244

    SHA256

    7531f2307173819b0c079c0827c1cb5f13462c3f556e920e355b3effa966db9e

    SHA512

    fb090f4e9b34e1caf0472b1e83460bcd0645d2acdf2097967f90471b9a5dffa098c52a0686edefbd27c52811ec39f2aa64b56477052d6d894fa081d78bdb2bdb

  • memory/3620-133-0x0000029755920000-0x0000029755930000-memory.dmp

    Filesize

    64KB

  • memory/3620-134-0x0000029755980000-0x0000029755990000-memory.dmp

    Filesize

    64KB

  • memory/3620-135-0x0000029758030000-0x0000029758034000-memory.dmp

    Filesize

    16KB