Analysis

  • max time kernel
    176s
  • max time network
    187s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    12-02-2022 05:10

General

  • Target

    138028b974d2d83c458f53eeda2d6e7d4faeeb12a82c57a67bbb840d8635a07c.exe

  • Size

    216KB

  • MD5

    476bbb40555295c09c0902bd4ca2fd22

  • SHA1

    d183fc03fb6db02e6532971517d609889d73d5e6

  • SHA256

    138028b974d2d83c458f53eeda2d6e7d4faeeb12a82c57a67bbb840d8635a07c

  • SHA512

    f44a01eca4094ffd160f5f8f1b179e4cfbfcbf1cdd74967a30f62508443a9ed060980cdf3f4a8748038a2356ffb2798b61f55aa67e8a50ca1dd2b92b5cd81888

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Sakula Payload 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 46 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\138028b974d2d83c458f53eeda2d6e7d4faeeb12a82c57a67bbb840d8635a07c.exe
    "C:\Users\Admin\AppData\Local\Temp\138028b974d2d83c458f53eeda2d6e7d4faeeb12a82c57a67bbb840d8635a07c.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2852
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:2600
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\138028b974d2d83c458f53eeda2d6e7d4faeeb12a82c57a67bbb840d8635a07c.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4032
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:4076
  • C:\Windows\system32\MusNotifyIcon.exe
    %systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 13
    1⤵
    • Checks processor information in registry
    PID:2660
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k NetworkService -p
    1⤵
    • Modifies data under HKEY_USERS
    PID:3904
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:1916

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    13a27dc9549bfd13289856c1fc5dcc72

    SHA1

    40d64c47d0b434aec2d5c25ef3baa56c336eaebc

    SHA256

    f2d31975d48a4069d937e176f09094387c73f7a276eb779f1180bf6c043008f0

    SHA512

    3a23a79cb002a3fe8a655420d054887cb1e8277b91db1cfb9251e3e0623cb67cf2a7708bb8bf5544b4ab864c9e22b81d7553037cd396e19bdb17de5e0042cf7c

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    13a27dc9549bfd13289856c1fc5dcc72

    SHA1

    40d64c47d0b434aec2d5c25ef3baa56c336eaebc

    SHA256

    f2d31975d48a4069d937e176f09094387c73f7a276eb779f1180bf6c043008f0

    SHA512

    3a23a79cb002a3fe8a655420d054887cb1e8277b91db1cfb9251e3e0623cb67cf2a7708bb8bf5544b4ab864c9e22b81d7553037cd396e19bdb17de5e0042cf7c

  • memory/2852-132-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB