Analysis

  • max time kernel
    142s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    12-02-2022 05:05

General

  • Target

    13b4689407c70248b84bb0da1acee762bdfabf47d21326590ed43ac80fcd20c2.exe

  • Size

    192KB

  • MD5

    8bd20112e1cd9d03d67be6c2bab54bd1

  • SHA1

    d9d34f8d0eea6be79ae253bed7f3c2d097058c55

  • SHA256

    13b4689407c70248b84bb0da1acee762bdfabf47d21326590ed43ac80fcd20c2

  • SHA512

    0f1545f1b86dfd56c2e941e94b2617870b7faca594f7aade8475a327b3d108ea99ce8a2b0e6e536ea2d814686e70916b241ed6671f2aa732323268c84c30250f

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Sakula Payload 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\13b4689407c70248b84bb0da1acee762bdfabf47d21326590ed43ac80fcd20c2.exe
    "C:\Users\Admin\AppData\Local\Temp\13b4689407c70248b84bb0da1acee762bdfabf47d21326590ed43ac80fcd20c2.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1688
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:1156
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\13b4689407c70248b84bb0da1acee762bdfabf47d21326590ed43ac80fcd20c2.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:1188
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:1184

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    57f88ba12eab30024a644baeebffbbfe

    SHA1

    84d4bc6a2de8720c413f438be8095d42292fe928

    SHA256

    0d0b7f9ecd90ba21a765c856da66419e4c6816608b98efb523b32d9f548ccb5f

    SHA512

    3c1a504fc74380630ddff53490b2061728acc128f2c719ba41c4ad2e42ac1b4b3f4e752a87a6dc2238666e82350922ca7b849e3934e88b07b37e39a4d1875f63

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    57f88ba12eab30024a644baeebffbbfe

    SHA1

    84d4bc6a2de8720c413f438be8095d42292fe928

    SHA256

    0d0b7f9ecd90ba21a765c856da66419e4c6816608b98efb523b32d9f548ccb5f

    SHA512

    3c1a504fc74380630ddff53490b2061728acc128f2c719ba41c4ad2e42ac1b4b3f4e752a87a6dc2238666e82350922ca7b849e3934e88b07b37e39a4d1875f63

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    57f88ba12eab30024a644baeebffbbfe

    SHA1

    84d4bc6a2de8720c413f438be8095d42292fe928

    SHA256

    0d0b7f9ecd90ba21a765c856da66419e4c6816608b98efb523b32d9f548ccb5f

    SHA512

    3c1a504fc74380630ddff53490b2061728acc128f2c719ba41c4ad2e42ac1b4b3f4e752a87a6dc2238666e82350922ca7b849e3934e88b07b37e39a4d1875f63

  • memory/1688-54-0x0000000075AB1000-0x0000000075AB3000-memory.dmp

    Filesize

    8KB