Analysis

  • max time kernel
    168s
  • max time network
    175s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    12-02-2022 06:17

General

  • Target

    106875161a73af7a2b857be111a7559283c5135b494ffba498281c82cb952a21.exe

  • Size

    216KB

  • MD5

    ec0d33f9ba5379071c38133b5736a04d

  • SHA1

    54e5eda285d3f08f6bd1f28f1dde1341af34e913

  • SHA256

    106875161a73af7a2b857be111a7559283c5135b494ffba498281c82cb952a21

  • SHA512

    dc83e9b16b6bfeb2a1cf3adf562ca112eb5d8fd331ef3ad9ae2a2c975bec723233ebd4e741e1da69bc882cba6d0132d6bb9388cc2889909e79dc75aeaa6114ae

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Sakula Payload 4 IoCs
  • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    suricata: ET MALWARE SUSPICIOUS UA (iexplore)

  • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\106875161a73af7a2b857be111a7559283c5135b494ffba498281c82cb952a21.exe
    "C:\Users\Admin\AppData\Local\Temp\106875161a73af7a2b857be111a7559283c5135b494ffba498281c82cb952a21.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4476
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:3240
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\106875161a73af7a2b857be111a7559283c5135b494ffba498281c82cb952a21.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1888
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:1240
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:5096
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:1952

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    5d7615a2c62ef95f8b3c8987253c6d72

    SHA1

    51901d7876ab286123e4e784969ae8877061ef36

    SHA256

    ab945d1d6c80fd55611f096a21876fc7ea5d45d6dd1453e7e9d86252d3a2bd10

    SHA512

    0ba766a7e31d5640e539251a9833b04a4cf70f58ec0cc59eda7b1c674fe99730daff97c7abefeddbcbee58f858e2e7596d0d2dda1c0be2eb59533e786f5bf796

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    5d7615a2c62ef95f8b3c8987253c6d72

    SHA1

    51901d7876ab286123e4e784969ae8877061ef36

    SHA256

    ab945d1d6c80fd55611f096a21876fc7ea5d45d6dd1453e7e9d86252d3a2bd10

    SHA512

    0ba766a7e31d5640e539251a9833b04a4cf70f58ec0cc59eda7b1c674fe99730daff97c7abefeddbcbee58f858e2e7596d0d2dda1c0be2eb59533e786f5bf796

  • memory/3240-136-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/4476-135-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/5096-133-0x000002861F720000-0x000002861F730000-memory.dmp

    Filesize

    64KB

  • memory/5096-132-0x000002861F160000-0x000002861F170000-memory.dmp

    Filesize

    64KB

  • memory/5096-134-0x0000028621D90000-0x0000028621D94000-memory.dmp

    Filesize

    16KB