Analysis
-
max time kernel
157s -
max time network
181s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
12-02-2022 06:20
Static task
static1
Behavioral task
behavioral1
Sample
104694573c63a19533aced1cd8e5c36f5cf847c4ebb3d63e4200115a90970b23.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
104694573c63a19533aced1cd8e5c36f5cf847c4ebb3d63e4200115a90970b23.exe
Resource
win10v2004-en-20220112
General
-
Target
104694573c63a19533aced1cd8e5c36f5cf847c4ebb3d63e4200115a90970b23.exe
-
Size
216KB
-
MD5
0135c0a649b962219ea07348e21994a3
-
SHA1
b557fa3a5aace5d9a624165a6b14ab3e1128946b
-
SHA256
104694573c63a19533aced1cd8e5c36f5cf847c4ebb3d63e4200115a90970b23
-
SHA512
4d4d258cc16c9f4967930d16a45291bfdfbe08b9a7794722cede67b0acc3aa5ed46ca3d92bad0c5d244087c0ef633d52df451d54b1ced5c1149e249eec1a51bd
Malware Config
Signatures
-
Sakula Payload 4 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula behavioral1/memory/1316-59-0x0000000000400000-0x0000000000420000-memory.dmp family_sakula behavioral1/memory/1672-60-0x0000000000400000-0x0000000000420000-memory.dmp family_sakula -
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 1672 MediaCenter.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1116 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
104694573c63a19533aced1cd8e5c36f5cf847c4ebb3d63e4200115a90970b23.exepid process 1316 104694573c63a19533aced1cd8e5c36f5cf847c4ebb3d63e4200115a90970b23.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
104694573c63a19533aced1cd8e5c36f5cf847c4ebb3d63e4200115a90970b23.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 104694573c63a19533aced1cd8e5c36f5cf847c4ebb3d63e4200115a90970b23.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
104694573c63a19533aced1cd8e5c36f5cf847c4ebb3d63e4200115a90970b23.exedescription pid process Token: SeIncBasePriorityPrivilege 1316 104694573c63a19533aced1cd8e5c36f5cf847c4ebb3d63e4200115a90970b23.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
104694573c63a19533aced1cd8e5c36f5cf847c4ebb3d63e4200115a90970b23.execmd.exedescription pid process target process PID 1316 wrote to memory of 1672 1316 104694573c63a19533aced1cd8e5c36f5cf847c4ebb3d63e4200115a90970b23.exe MediaCenter.exe PID 1316 wrote to memory of 1672 1316 104694573c63a19533aced1cd8e5c36f5cf847c4ebb3d63e4200115a90970b23.exe MediaCenter.exe PID 1316 wrote to memory of 1672 1316 104694573c63a19533aced1cd8e5c36f5cf847c4ebb3d63e4200115a90970b23.exe MediaCenter.exe PID 1316 wrote to memory of 1672 1316 104694573c63a19533aced1cd8e5c36f5cf847c4ebb3d63e4200115a90970b23.exe MediaCenter.exe PID 1316 wrote to memory of 1116 1316 104694573c63a19533aced1cd8e5c36f5cf847c4ebb3d63e4200115a90970b23.exe cmd.exe PID 1316 wrote to memory of 1116 1316 104694573c63a19533aced1cd8e5c36f5cf847c4ebb3d63e4200115a90970b23.exe cmd.exe PID 1316 wrote to memory of 1116 1316 104694573c63a19533aced1cd8e5c36f5cf847c4ebb3d63e4200115a90970b23.exe cmd.exe PID 1316 wrote to memory of 1116 1316 104694573c63a19533aced1cd8e5c36f5cf847c4ebb3d63e4200115a90970b23.exe cmd.exe PID 1116 wrote to memory of 1104 1116 cmd.exe PING.EXE PID 1116 wrote to memory of 1104 1116 cmd.exe PING.EXE PID 1116 wrote to memory of 1104 1116 cmd.exe PING.EXE PID 1116 wrote to memory of 1104 1116 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\104694573c63a19533aced1cd8e5c36f5cf847c4ebb3d63e4200115a90970b23.exe"C:\Users\Admin\AppData\Local\Temp\104694573c63a19533aced1cd8e5c36f5cf847c4ebb3d63e4200115a90970b23.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:1672 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\104694573c63a19533aced1cd8e5c36f5cf847c4ebb3d63e4200115a90970b23.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1104
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
19f1095b9fae7fea4208b199ffcdb4a8
SHA132e9e43b6adf9697044b902ed56f761118a8dbd2
SHA256b992583c61c12af96c0936261b20d81a57956731e007b77e3e48dab938d4a6b9
SHA512375edc2aeaea5db856a5648522d9c790a8f9f580c23113939021691af5f9718a77588ebd78d50f8ca41e326446ece49ba2f7f0a352224d7ec0738d1ce9fc4d14
-
MD5
19f1095b9fae7fea4208b199ffcdb4a8
SHA132e9e43b6adf9697044b902ed56f761118a8dbd2
SHA256b992583c61c12af96c0936261b20d81a57956731e007b77e3e48dab938d4a6b9
SHA512375edc2aeaea5db856a5648522d9c790a8f9f580c23113939021691af5f9718a77588ebd78d50f8ca41e326446ece49ba2f7f0a352224d7ec0738d1ce9fc4d14