Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    12-02-2022 05:13

General

  • Target

    135d299ddf1bf0772e247f5ed5f14258d431b5622d9edac8eb16d1b8ceae3f7b.exe

  • Size

    89KB

  • MD5

    5f26c967f071356b4821d81cea7f53d1

  • SHA1

    8cde9721a464ff2bc6b366b4bc471e96b037ad60

  • SHA256

    135d299ddf1bf0772e247f5ed5f14258d431b5622d9edac8eb16d1b8ceae3f7b

  • SHA512

    45d68a2dcfd0a1fa643737978729f6145ab983d2d4465bce616648e8e415469ffc2963157c78fbbd698d5967932a4817abb09128f25195d52b38068d700696c9

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Sakula Payload 2 IoCs
  • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    suricata: ET MALWARE SUSPICIOUS UA (iexplore)

  • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\135d299ddf1bf0772e247f5ed5f14258d431b5622d9edac8eb16d1b8ceae3f7b.exe
    "C:\Users\Admin\AppData\Local\Temp\135d299ddf1bf0772e247f5ed5f14258d431b5622d9edac8eb16d1b8ceae3f7b.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1588
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:1272
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\135d299ddf1bf0772e247f5ed5f14258d431b5622d9edac8eb16d1b8ceae3f7b.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:776
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:1096

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    b44cdafd419ab463bc8f26ae44326c88

    SHA1

    e7ea25a362721e6e47d16ab7d171ecc400ca180a

    SHA256

    20beac6ab3b1a0ce3ad1b47067ab4534e19e267a8c68937834db322ae8152dae

    SHA512

    f59bf35a58377755c3a858f85ab564c279177fa1726275fc5174c902a9a71c81410a1ce0975951f86605b9960c25056f4bf3e26be79fc5d6982a8ce38e5947f7

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    b44cdafd419ab463bc8f26ae44326c88

    SHA1

    e7ea25a362721e6e47d16ab7d171ecc400ca180a

    SHA256

    20beac6ab3b1a0ce3ad1b47067ab4534e19e267a8c68937834db322ae8152dae

    SHA512

    f59bf35a58377755c3a858f85ab564c279177fa1726275fc5174c902a9a71c81410a1ce0975951f86605b9960c25056f4bf3e26be79fc5d6982a8ce38e5947f7

  • memory/1588-54-0x0000000076421000-0x0000000076423000-memory.dmp

    Filesize

    8KB