Analysis

  • max time kernel
    137s
  • max time network
    170s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    12-02-2022 05:11

General

  • Target

    136ef9ed372701643c8453060b033289272fb458dbcb2fb04481446093df505d.exe

  • Size

    101KB

  • MD5

    f27bf731faf6012b38f73e397b82d431

  • SHA1

    63c2a46f070268c1164b5b39c0d6a22873e2a769

  • SHA256

    136ef9ed372701643c8453060b033289272fb458dbcb2fb04481446093df505d

  • SHA512

    c133364da007bb6c765ced53556ce573eff591c20c9d18348d25c092122acbcddbf4b40b0f138baadc7386689b9ea9abde67b8d0a76a557dfb01857e30160989

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Sakula Payload 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\136ef9ed372701643c8453060b033289272fb458dbcb2fb04481446093df505d.exe
    "C:\Users\Admin\AppData\Local\Temp\136ef9ed372701643c8453060b033289272fb458dbcb2fb04481446093df505d.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1188
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:1656
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\136ef9ed372701643c8453060b033289272fb458dbcb2fb04481446093df505d.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:920
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:1928

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    504a77f435834563b471b27e738b8aef

    SHA1

    dcb5d4bdb09a3ea06bd96852d8b2d0c7c4a11e00

    SHA256

    1142f156c04905e1fdb151f10a32450ff0986b2a71edf66e4b0c5f4b91991fe5

    SHA512

    00b6f5e9171561810619d0df125bf9f9f0385d344561202d6c9a797795757a57934950def3c8d247f71529a0beffd4a86157e1588d1a7f8c6b4b19cda05e678c

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    504a77f435834563b471b27e738b8aef

    SHA1

    dcb5d4bdb09a3ea06bd96852d8b2d0c7c4a11e00

    SHA256

    1142f156c04905e1fdb151f10a32450ff0986b2a71edf66e4b0c5f4b91991fe5

    SHA512

    00b6f5e9171561810619d0df125bf9f9f0385d344561202d6c9a797795757a57934950def3c8d247f71529a0beffd4a86157e1588d1a7f8c6b4b19cda05e678c

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    504a77f435834563b471b27e738b8aef

    SHA1

    dcb5d4bdb09a3ea06bd96852d8b2d0c7c4a11e00

    SHA256

    1142f156c04905e1fdb151f10a32450ff0986b2a71edf66e4b0c5f4b91991fe5

    SHA512

    00b6f5e9171561810619d0df125bf9f9f0385d344561202d6c9a797795757a57934950def3c8d247f71529a0beffd4a86157e1588d1a7f8c6b4b19cda05e678c

  • memory/1188-55-0x0000000074EC1000-0x0000000074EC3000-memory.dmp

    Filesize

    8KB