Analysis

  • max time kernel
    163s
  • max time network
    171s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    12-02-2022 05:17

General

  • Target

    132cdfb1ac0fb21148e9613bf3a7234b497e5440ebe1a8b088a29426254452d6.exe

  • Size

    36KB

  • MD5

    6f93c7a27d166bb1136c5d18a2bc9721

  • SHA1

    d2d62914c5e5c9f9ab4f6d7d00b2d6a118ca6ade

  • SHA256

    132cdfb1ac0fb21148e9613bf3a7234b497e5440ebe1a8b088a29426254452d6

  • SHA512

    12e43b77ea0dff2e45fab116ad3d72ba494b3e2fc087ff7056c044f1904fc99cb9d6cc4398bbf2c728d1bf727c7cabb7133c52830ca113cfaadf7e189f7b9e0b

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\132cdfb1ac0fb21148e9613bf3a7234b497e5440ebe1a8b088a29426254452d6.exe
    "C:\Users\Admin\AppData\Local\Temp\132cdfb1ac0fb21148e9613bf3a7234b497e5440ebe1a8b088a29426254452d6.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3292
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:4384
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\132cdfb1ac0fb21148e9613bf3a7234b497e5440ebe1a8b088a29426254452d6.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4864
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:828
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:204
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:3000

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    b03892be47f81a61d473f8998c0964aa

    SHA1

    ab97e883ff7ef65d32a8bc8ac5cfe5d32e422932

    SHA256

    7adf9f2dbd22ee5766fae30efc01a829df26017b8501b1c6ec51a8dd99f5407c

    SHA512

    8ba8779564548d553a7d99a2df88acd582907549bb3a2e40f2d5e0f4bf90d5b614f037575f80f35db84c9d896be6be5026c8a0ae17e94176b45b558355ec4e3e

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    b03892be47f81a61d473f8998c0964aa

    SHA1

    ab97e883ff7ef65d32a8bc8ac5cfe5d32e422932

    SHA256

    7adf9f2dbd22ee5766fae30efc01a829df26017b8501b1c6ec51a8dd99f5407c

    SHA512

    8ba8779564548d553a7d99a2df88acd582907549bb3a2e40f2d5e0f4bf90d5b614f037575f80f35db84c9d896be6be5026c8a0ae17e94176b45b558355ec4e3e

  • memory/204-132-0x00000278FCB90000-0x00000278FCBA0000-memory.dmp

    Filesize

    64KB

  • memory/204-133-0x00000278FD120000-0x00000278FD130000-memory.dmp

    Filesize

    64KB

  • memory/204-134-0x00000278FF810000-0x00000278FF814000-memory.dmp

    Filesize

    16KB