Analysis

  • max time kernel
    165s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    12-02-2022 05:48

General

  • Target

    11a1878dff5ef56ed5b1c2f534afac7dd7e60a2bd46f37f4e59440a9b04c396b.exe

  • Size

    216KB

  • MD5

    a65daee6c8559daee438135e3691dd5d

  • SHA1

    122b40fbede11ec9e7e6aa6cc92c9646ac8d24fd

  • SHA256

    11a1878dff5ef56ed5b1c2f534afac7dd7e60a2bd46f37f4e59440a9b04c396b

  • SHA512

    e619b06bb8a476e7f2b57f94a330ae7e9c24b8f4e4fa81ab8c82db9e55815fe45e5dae430dea9b3b84118121556bea2090648c0ba24012dd8eafd31c60c8e4ea

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Sakula Payload 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 51 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\11a1878dff5ef56ed5b1c2f534afac7dd7e60a2bd46f37f4e59440a9b04c396b.exe
    "C:\Users\Admin\AppData\Local\Temp\11a1878dff5ef56ed5b1c2f534afac7dd7e60a2bd46f37f4e59440a9b04c396b.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2936
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:1180
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\11a1878dff5ef56ed5b1c2f534afac7dd7e60a2bd46f37f4e59440a9b04c396b.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:968
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:496
  • C:\Windows\system32\MusNotifyIcon.exe
    %systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 13
    1⤵
    • Checks processor information in registry
    PID:1256
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k NetworkService -p
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    PID:2260
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:3300

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    1cb2fff65d94aafe797c16c48017c7d6

    SHA1

    ebef8e19d11ea7aa985a12acbf12fbabf3422060

    SHA256

    ba6698c666fe5846ac7169d9e46aee7411c8a1b96b4e388108e234276e40fb8a

    SHA512

    f86214a87ac1b77bd238e97962f190b8629450ccbeca2677fd8bc340a9700f470f769d84bf76179556f1530a5b4843a8743baa53fd8b9b44b53b0121d436227f

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    1cb2fff65d94aafe797c16c48017c7d6

    SHA1

    ebef8e19d11ea7aa985a12acbf12fbabf3422060

    SHA256

    ba6698c666fe5846ac7169d9e46aee7411c8a1b96b4e388108e234276e40fb8a

    SHA512

    f86214a87ac1b77bd238e97962f190b8629450ccbeca2677fd8bc340a9700f470f769d84bf76179556f1530a5b4843a8743baa53fd8b9b44b53b0121d436227f

  • memory/1180-133-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2936-132-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB