Analysis

  • max time kernel
    145s
  • max time network
    173s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    12-02-2022 05:09

General

  • Target

    13899c64ede7beef26c06811d632566c1e10bfa9f6da21d53ad4d37477094123.exe

  • Size

    60KB

  • MD5

    8d114ce79ef8526eb1c9c479e1494f44

  • SHA1

    440ebb5b0f55ac54f4a1dfa97d233780b8081bf4

  • SHA256

    13899c64ede7beef26c06811d632566c1e10bfa9f6da21d53ad4d37477094123

  • SHA512

    e40f491b0ed14637720636635f49572fd362375cfd1cf44e097b0195bfd3210ab46e8fa72dfc44f7232335f7a70f31ec22ad20967d2cc5b2c696613d8b3f84ca

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\13899c64ede7beef26c06811d632566c1e10bfa9f6da21d53ad4d37477094123.exe
    "C:\Users\Admin\AppData\Local\Temp\13899c64ede7beef26c06811d632566c1e10bfa9f6da21d53ad4d37477094123.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1648
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:1636
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\13899c64ede7beef26c06811d632566c1e10bfa9f6da21d53ad4d37477094123.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:1100
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:1952

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    915fc30e0e695da731a795367091ec3e

    SHA1

    a0d43eda2b66787d19ab2f7a93caf607bf0cf58d

    SHA256

    89369ac0267416efa2b6b695abbb6881c9219a9462b88b71314b00b148c7c83b

    SHA512

    2e29e260b23eebf3caff70fae9fab0b1acc320ac2412d5b7e6bc46a49c6ed5d45792a496f55e64e0a188f0bee62dcaac31a23b985c6896b6564f8f07a1daac4a

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    915fc30e0e695da731a795367091ec3e

    SHA1

    a0d43eda2b66787d19ab2f7a93caf607bf0cf58d

    SHA256

    89369ac0267416efa2b6b695abbb6881c9219a9462b88b71314b00b148c7c83b

    SHA512

    2e29e260b23eebf3caff70fae9fab0b1acc320ac2412d5b7e6bc46a49c6ed5d45792a496f55e64e0a188f0bee62dcaac31a23b985c6896b6564f8f07a1daac4a

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    915fc30e0e695da731a795367091ec3e

    SHA1

    a0d43eda2b66787d19ab2f7a93caf607bf0cf58d

    SHA256

    89369ac0267416efa2b6b695abbb6881c9219a9462b88b71314b00b148c7c83b

    SHA512

    2e29e260b23eebf3caff70fae9fab0b1acc320ac2412d5b7e6bc46a49c6ed5d45792a496f55e64e0a188f0bee62dcaac31a23b985c6896b6564f8f07a1daac4a

  • memory/1648-55-0x0000000075021000-0x0000000075023000-memory.dmp

    Filesize

    8KB