Analysis

  • max time kernel
    163s
  • max time network
    178s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    12-02-2022 05:50

General

  • Target

    118ee3a16c6325b646f797049eba9233269e6fdce4ce8143a993c32d043e033e.exe

  • Size

    58KB

  • MD5

    3624087d07f1a94c250bf4bf3fdcc76c

  • SHA1

    f477687c7fbc6727075c167fd0cf69c6178b4d89

  • SHA256

    118ee3a16c6325b646f797049eba9233269e6fdce4ce8143a993c32d043e033e

  • SHA512

    f0f33ae51aab57fc9a93c5972a31e2e5d4c0f6ad6e6e0b1c40b11880af649d3d3617b8f7a919a613f5cfe7cc66b1167de818d903503e583ba31dc102207276cd

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 50 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\118ee3a16c6325b646f797049eba9233269e6fdce4ce8143a993c32d043e033e.exe
    "C:\Users\Admin\AppData\Local\Temp\118ee3a16c6325b646f797049eba9233269e6fdce4ce8143a993c32d043e033e.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3880
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:2692
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\118ee3a16c6325b646f797049eba9233269e6fdce4ce8143a993c32d043e033e.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3332
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:2756
  • C:\Windows\system32\MusNotifyIcon.exe
    %systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 13
    1⤵
    • Checks processor information in registry
    PID:624
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k NetworkService -p
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    PID:1800
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:3488

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    6b763ec7a3477f235810d7619a446d48

    SHA1

    51826d821ca17abfcc0cd0b76a3995302679daab

    SHA256

    211f2fa03efb254b9318bb678ab5a5faca24da0c7ce9c395eb3ae547f564cc79

    SHA512

    94bd01f79a0629da9b739662827446c44687e175d5da97330aed4bad5734ebec3ad75bc6e042fc7268a24716fb1c061c1cdb2896e84b750eb27eb65f3da0288d

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    6b763ec7a3477f235810d7619a446d48

    SHA1

    51826d821ca17abfcc0cd0b76a3995302679daab

    SHA256

    211f2fa03efb254b9318bb678ab5a5faca24da0c7ce9c395eb3ae547f564cc79

    SHA512

    94bd01f79a0629da9b739662827446c44687e175d5da97330aed4bad5734ebec3ad75bc6e042fc7268a24716fb1c061c1cdb2896e84b750eb27eb65f3da0288d