Analysis

  • max time kernel
    134s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    12-02-2022 05:05

General

  • Target

    13adb4e0b746afc1815f1236d2574604d32adca336abcc0d990be4fc6888f9f5.exe

  • Size

    35KB

  • MD5

    ec21ccd5b599e8075063f66817c56e58

  • SHA1

    1c2be6204ed1e4ff27cfd62cbe3373f07447435e

  • SHA256

    13adb4e0b746afc1815f1236d2574604d32adca336abcc0d990be4fc6888f9f5

  • SHA512

    1f4737bca6b01320dfaef65c650dd7b3c65bc37acccf30e3c9bf1a3d30c20c56dd17c3afd2bbb9402bce8b2bd15e5e7d2035624db1eeac515cb3cb8fe5e46eb7

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\13adb4e0b746afc1815f1236d2574604d32adca336abcc0d990be4fc6888f9f5.exe
    "C:\Users\Admin\AppData\Local\Temp\13adb4e0b746afc1815f1236d2574604d32adca336abcc0d990be4fc6888f9f5.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:2756
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\13adb4e0b746afc1815f1236d2574604d32adca336abcc0d990be4fc6888f9f5.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:112
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:316
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:928
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2104

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    f15108da25baa8f919b244c46c346b08

    SHA1

    833eda03aa82ce031d2601d94ea6ebb57c3049c1

    SHA256

    25026e54a0ec3e5aa7203f02abca078d5b1967b9bf7e77fbb500305a0cd22fff

    SHA512

    1369c3753fc7c02037b26a8e8412cbd5af7fa49ed9a167878dcc1431e1419ed27bdccee6159cea2c252179aa3a4976ad8b97d6516859eb3d01c38b24fa164af6

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    f15108da25baa8f919b244c46c346b08

    SHA1

    833eda03aa82ce031d2601d94ea6ebb57c3049c1

    SHA256

    25026e54a0ec3e5aa7203f02abca078d5b1967b9bf7e77fbb500305a0cd22fff

    SHA512

    1369c3753fc7c02037b26a8e8412cbd5af7fa49ed9a167878dcc1431e1419ed27bdccee6159cea2c252179aa3a4976ad8b97d6516859eb3d01c38b24fa164af6

  • memory/928-132-0x0000022C86B90000-0x0000022C86BA0000-memory.dmp

    Filesize

    64KB

  • memory/928-133-0x0000022C87360000-0x0000022C87370000-memory.dmp

    Filesize

    64KB

  • memory/928-134-0x0000022C89F70000-0x0000022C89F74000-memory.dmp

    Filesize

    16KB