Analysis

  • max time kernel
    179s
  • max time network
    194s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    12-02-2022 05:51

General

  • Target

    117da7e5b8cbc2b64d7d2393c2f8e4c35665b46e9e085ddbfc1df7ed6a0493b4.exe

  • Size

    99KB

  • MD5

    7060a4d5c8593f1f97d80f417b0ef69e

  • SHA1

    dcf9a387c686ef419b6684e273f29165fa433039

  • SHA256

    117da7e5b8cbc2b64d7d2393c2f8e4c35665b46e9e085ddbfc1df7ed6a0493b4

  • SHA512

    c8abcd59f2d6a92903645b139463648ebd9f0779b4af7b5f2b0d068ba7a5829952e8df821820e15ac2a4d7a9ab8b415876404cf06a35f486dc92670f0e43c80a

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Sakula Payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k wusvcs -p
    1⤵
      PID:3504
    • C:\Users\Admin\AppData\Local\Temp\117da7e5b8cbc2b64d7d2393c2f8e4c35665b46e9e085ddbfc1df7ed6a0493b4.exe
      "C:\Users\Admin\AppData\Local\Temp\117da7e5b8cbc2b64d7d2393c2f8e4c35665b46e9e085ddbfc1df7ed6a0493b4.exe"
      1⤵
      • Checks computer location settings
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4048
      • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
        C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
        2⤵
        • Executes dropped EXE
        PID:2704
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\117da7e5b8cbc2b64d7d2393c2f8e4c35665b46e9e085ddbfc1df7ed6a0493b4.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2580
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1
          3⤵
          • Runs ping.exe
          PID:3544
    • C:\Windows\system32\MusNotifyIcon.exe
      %systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 0
      1⤵
      • Checks processor information in registry
      PID:60

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

      MD5

      18e908237286a8c59e99dc01392487dd

      SHA1

      72874b2fd6d3311776cdf3d523d17c8ee0e182e2

      SHA256

      15a05b96f22042b6b29e80618add65d532b5d59944f7f2768548f5ac2b923d83

      SHA512

      9d996194b2461bbd549f8b3e122b8353cfba10c7d9f4d64f3dc309a0fed52ab71859076ed9cacf18bbcddc5b6190daf87f64f72a357e52adc68a09bdfe997b41

    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

      MD5

      18e908237286a8c59e99dc01392487dd

      SHA1

      72874b2fd6d3311776cdf3d523d17c8ee0e182e2

      SHA256

      15a05b96f22042b6b29e80618add65d532b5d59944f7f2768548f5ac2b923d83

      SHA512

      9d996194b2461bbd549f8b3e122b8353cfba10c7d9f4d64f3dc309a0fed52ab71859076ed9cacf18bbcddc5b6190daf87f64f72a357e52adc68a09bdfe997b41