Analysis

  • max time kernel
    157s
  • max time network
    181s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    12-02-2022 06:20

General

  • Target

    104694573c63a19533aced1cd8e5c36f5cf847c4ebb3d63e4200115a90970b23.exe

  • Size

    216KB

  • MD5

    0135c0a649b962219ea07348e21994a3

  • SHA1

    b557fa3a5aace5d9a624165a6b14ab3e1128946b

  • SHA256

    104694573c63a19533aced1cd8e5c36f5cf847c4ebb3d63e4200115a90970b23

  • SHA512

    4d4d258cc16c9f4967930d16a45291bfdfbe08b9a7794722cede67b0acc3aa5ed46ca3d92bad0c5d244087c0ef633d52df451d54b1ced5c1149e249eec1a51bd

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Sakula Payload 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\104694573c63a19533aced1cd8e5c36f5cf847c4ebb3d63e4200115a90970b23.exe
    "C:\Users\Admin\AppData\Local\Temp\104694573c63a19533aced1cd8e5c36f5cf847c4ebb3d63e4200115a90970b23.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1316
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:1672
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\104694573c63a19533aced1cd8e5c36f5cf847c4ebb3d63e4200115a90970b23.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:1116
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:1104

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    19f1095b9fae7fea4208b199ffcdb4a8

    SHA1

    32e9e43b6adf9697044b902ed56f761118a8dbd2

    SHA256

    b992583c61c12af96c0936261b20d81a57956731e007b77e3e48dab938d4a6b9

    SHA512

    375edc2aeaea5db856a5648522d9c790a8f9f580c23113939021691af5f9718a77588ebd78d50f8ca41e326446ece49ba2f7f0a352224d7ec0738d1ce9fc4d14

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    19f1095b9fae7fea4208b199ffcdb4a8

    SHA1

    32e9e43b6adf9697044b902ed56f761118a8dbd2

    SHA256

    b992583c61c12af96c0936261b20d81a57956731e007b77e3e48dab938d4a6b9

    SHA512

    375edc2aeaea5db856a5648522d9c790a8f9f580c23113939021691af5f9718a77588ebd78d50f8ca41e326446ece49ba2f7f0a352224d7ec0738d1ce9fc4d14

  • memory/1316-55-0x0000000074B21000-0x0000000074B23000-memory.dmp

    Filesize

    8KB

  • memory/1316-59-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/1672-60-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB