Analysis

  • max time kernel
    170s
  • max time network
    168s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    12-02-2022 06:16

General

  • Target

    1073c13e4098f968103ade1ab7330b9d45fbbe0c8d9d00daeb70753e27867af7.exe

  • Size

    58KB

  • MD5

    383bae5891ea3ddd6d6204b487ade385

  • SHA1

    9b99c339ca887bde39a007acba537263e47b15ef

  • SHA256

    1073c13e4098f968103ade1ab7330b9d45fbbe0c8d9d00daeb70753e27867af7

  • SHA512

    f8d52f5a8bc9126042723195585c806edf57f3ad2f7680d301094f0bc1d97a5c65715ea631a2dce7082a6fc96b707d56c4b0513edbb08a9016821fe43f47dd09

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 48 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1073c13e4098f968103ade1ab7330b9d45fbbe0c8d9d00daeb70753e27867af7.exe
    "C:\Users\Admin\AppData\Local\Temp\1073c13e4098f968103ade1ab7330b9d45fbbe0c8d9d00daeb70753e27867af7.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2484
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:2876
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\1073c13e4098f968103ade1ab7330b9d45fbbe0c8d9d00daeb70753e27867af7.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3356
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:2660
  • C:\Windows\system32\MusNotifyIcon.exe
    %systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 13
    1⤵
    • Checks processor information in registry
    PID:2280
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k NetworkService -p
    1⤵
    • Modifies data under HKEY_USERS
    PID:1612
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:4040

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    02e07c2a31c4fed64f087dc658fffb26

    SHA1

    c5e0a733b0541819323efb2a42ebbc779f038704

    SHA256

    cd936a2ba8702f6b52869ec483860c99be606547461e8daf6c6ffab47163e0af

    SHA512

    025f1dab8c9da27cf1d1ade4aa1a7c5e2bf8113a130c65ea3800e8f666e3dda13533749f099ffce4497740a99fd32f0e5568c4cce47846a67bf96c61b76574c5

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    02e07c2a31c4fed64f087dc658fffb26

    SHA1

    c5e0a733b0541819323efb2a42ebbc779f038704

    SHA256

    cd936a2ba8702f6b52869ec483860c99be606547461e8daf6c6ffab47163e0af

    SHA512

    025f1dab8c9da27cf1d1ade4aa1a7c5e2bf8113a130c65ea3800e8f666e3dda13533749f099ffce4497740a99fd32f0e5568c4cce47846a67bf96c61b76574c5