Analysis

  • max time kernel
    121s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    12-02-2022 05:11

General

  • Target

    136de7eec5b1880c0e78a8ca6a5ff71f8ba92c1bca3c1b146a4e749bfd7e90cb.exe

  • Size

    60KB

  • MD5

    a3dca5e8d10e4447b0e247e6dcfea541

  • SHA1

    68eb9a74bb985252559912ff75ab4913833821fa

  • SHA256

    136de7eec5b1880c0e78a8ca6a5ff71f8ba92c1bca3c1b146a4e749bfd7e90cb

  • SHA512

    9e2fd841ff6b9f2461d15b18f973cfe8ec357b2f07ca9a2d3b010580aefa41920c586706036655281eb6fc5138161bac523a85434155cd46954613f2f6bbac45

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\136de7eec5b1880c0e78a8ca6a5ff71f8ba92c1bca3c1b146a4e749bfd7e90cb.exe
    "C:\Users\Admin\AppData\Local\Temp\136de7eec5b1880c0e78a8ca6a5ff71f8ba92c1bca3c1b146a4e749bfd7e90cb.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1552
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:1516
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\136de7eec5b1880c0e78a8ca6a5ff71f8ba92c1bca3c1b146a4e749bfd7e90cb.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:2008
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:1044

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    fc411277b9f8bec1bdfda3a5d5bee0cc

    SHA1

    29762999285643d6df1253e04d5fbcf9d71858b6

    SHA256

    ec0b03320b08b02eb028aeda44caa4d014bf96399404de274b2bab3662289ec0

    SHA512

    84023383cf47a90e07bfa20a892d2db06f0aa3b15cb478785efd028eeecc0981ca07992ce95e6bddc6818d6271b4173e1f4af359ece68711de1dd7fc6789f86d

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    fc411277b9f8bec1bdfda3a5d5bee0cc

    SHA1

    29762999285643d6df1253e04d5fbcf9d71858b6

    SHA256

    ec0b03320b08b02eb028aeda44caa4d014bf96399404de274b2bab3662289ec0

    SHA512

    84023383cf47a90e07bfa20a892d2db06f0aa3b15cb478785efd028eeecc0981ca07992ce95e6bddc6818d6271b4173e1f4af359ece68711de1dd7fc6789f86d

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    fc411277b9f8bec1bdfda3a5d5bee0cc

    SHA1

    29762999285643d6df1253e04d5fbcf9d71858b6

    SHA256

    ec0b03320b08b02eb028aeda44caa4d014bf96399404de274b2bab3662289ec0

    SHA512

    84023383cf47a90e07bfa20a892d2db06f0aa3b15cb478785efd028eeecc0981ca07992ce95e6bddc6818d6271b4173e1f4af359ece68711de1dd7fc6789f86d

  • memory/1552-54-0x0000000075601000-0x0000000075603000-memory.dmp

    Filesize

    8KB