Analysis

  • max time kernel
    150s
  • max time network
    171s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    12-02-2022 05:15

General

  • Target

    1341a4e9d629bf2e40c00e2add7015c1cfaa3afd1bcc9e42e853632599d12127.exe

  • Size

    99KB

  • MD5

    8962a85172d2c324409a9851d041f0ae

  • SHA1

    95bdce3e57b36f3015b6a53c4d97591d7ef6e440

  • SHA256

    1341a4e9d629bf2e40c00e2add7015c1cfaa3afd1bcc9e42e853632599d12127

  • SHA512

    485fe3c241eb049d9ffc32e6dcf52d119c9a1be8ebc9cca36161b832fa5128f76768342e281a88481a7a5f8a0ef982d223ffa4337b85495406e031fb2b913f66

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Sakula Payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1341a4e9d629bf2e40c00e2add7015c1cfaa3afd1bcc9e42e853632599d12127.exe
    "C:\Users\Admin\AppData\Local\Temp\1341a4e9d629bf2e40c00e2add7015c1cfaa3afd1bcc9e42e853632599d12127.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1484
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:5064
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\1341a4e9d629bf2e40c00e2add7015c1cfaa3afd1bcc9e42e853632599d12127.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4744
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:4028
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:4808
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:4156

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    8f796ccae33f976d30f2093fb49c631c

    SHA1

    9b2bc279817de062310033aee9799945bc3a63c1

    SHA256

    e82b8d33a275631401cf96cb6c29a465be281f5e7d6131882cc79345ee1f39f8

    SHA512

    bcbc27cd66fb2caf8248a63ff67bd577588d8d2cfd83dfac8ab2fdb31958b0cc5ed7a0f9f33fe2d1d65f241cf02811e9a2fc80c98eaaafc17edad11c16fab23a

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    8f796ccae33f976d30f2093fb49c631c

    SHA1

    9b2bc279817de062310033aee9799945bc3a63c1

    SHA256

    e82b8d33a275631401cf96cb6c29a465be281f5e7d6131882cc79345ee1f39f8

    SHA512

    bcbc27cd66fb2caf8248a63ff67bd577588d8d2cfd83dfac8ab2fdb31958b0cc5ed7a0f9f33fe2d1d65f241cf02811e9a2fc80c98eaaafc17edad11c16fab23a

  • memory/4808-132-0x000001AA5E3A0000-0x000001AA5E3B0000-memory.dmp

    Filesize

    64KB

  • memory/4808-133-0x000001AA5EB60000-0x000001AA5EB70000-memory.dmp

    Filesize

    64KB

  • memory/4808-134-0x000001AA61780000-0x000001AA61784000-memory.dmp

    Filesize

    16KB