Analysis

  • max time kernel
    144s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    12-02-2022 05:39

General

  • Target

    121aff5743cce838ab43308dd7df96f68cf8b62a4f68a63af31e704a755560c0.exe

  • Size

    36KB

  • MD5

    649ad5171d87f4b6769a9c62583ab9ca

  • SHA1

    e67ec7425473502e179e61010b57ac4ae0acdb25

  • SHA256

    121aff5743cce838ab43308dd7df96f68cf8b62a4f68a63af31e704a755560c0

  • SHA512

    f955199249bf178c814934993c6e7efc9068d96a375da2bdb105ecda5c18491e295f99c83b158cc7ee723823deae4ee8d71af7cbc6cc9b19d9be093a9b3331d7

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\121aff5743cce838ab43308dd7df96f68cf8b62a4f68a63af31e704a755560c0.exe
    "C:\Users\Admin\AppData\Local\Temp\121aff5743cce838ab43308dd7df96f68cf8b62a4f68a63af31e704a755560c0.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:856
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:1212
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\121aff5743cce838ab43308dd7df96f68cf8b62a4f68a63af31e704a755560c0.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:1244
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:1996

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    dab2aeaaae7e9f23bd47c9165113e385

    SHA1

    46dbd72b60c3d4b6922d845081877573cc559f69

    SHA256

    1e35dd1479c0fd9fb9779f88132933c257b59b9e96953b19d5dba99e563dc8ec

    SHA512

    2f864df4a7adf81b2f7db76283c0f446b5f505860e93caedf8ec7d1af63209a3042d7c75f976f98d492f516f33ce6b5f7545d2461f9852025878081c8041c404

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    dab2aeaaae7e9f23bd47c9165113e385

    SHA1

    46dbd72b60c3d4b6922d845081877573cc559f69

    SHA256

    1e35dd1479c0fd9fb9779f88132933c257b59b9e96953b19d5dba99e563dc8ec

    SHA512

    2f864df4a7adf81b2f7db76283c0f446b5f505860e93caedf8ec7d1af63209a3042d7c75f976f98d492f516f33ce6b5f7545d2461f9852025878081c8041c404

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    dab2aeaaae7e9f23bd47c9165113e385

    SHA1

    46dbd72b60c3d4b6922d845081877573cc559f69

    SHA256

    1e35dd1479c0fd9fb9779f88132933c257b59b9e96953b19d5dba99e563dc8ec

    SHA512

    2f864df4a7adf81b2f7db76283c0f446b5f505860e93caedf8ec7d1af63209a3042d7c75f976f98d492f516f33ce6b5f7545d2461f9852025878081c8041c404

  • memory/856-53-0x0000000075891000-0x0000000075893000-memory.dmp

    Filesize

    8KB