Analysis

  • max time kernel
    140s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    12-02-2022 06:02

General

  • Target

    11104bbe4123939b6ab9492913882c321ae46d63785ecf0bcc8bdb2f58c3da7a.exe

  • Size

    192KB

  • MD5

    287fa2be11073c1941e88263ee150687

  • SHA1

    39f30cb53b021baa3c71e882b1aefc6131135d71

  • SHA256

    11104bbe4123939b6ab9492913882c321ae46d63785ecf0bcc8bdb2f58c3da7a

  • SHA512

    c96d1f58e847cc93038c0b375d56044ee40c285dde099815fba152ea88dc5269d4a5d19c73063f713cb6240399a9a37fc92477b23c42e0d248da619d0fbe0b77

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Sakula Payload 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\11104bbe4123939b6ab9492913882c321ae46d63785ecf0bcc8bdb2f58c3da7a.exe
    "C:\Users\Admin\AppData\Local\Temp\11104bbe4123939b6ab9492913882c321ae46d63785ecf0bcc8bdb2f58c3da7a.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:964
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:804
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\11104bbe4123939b6ab9492913882c321ae46d63785ecf0bcc8bdb2f58c3da7a.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:296
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:828

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    0d13b1b57c6b67c483d4f9eebdc3b188

    SHA1

    c24e6e1be948d9d14267aafe63c68d3e7134cfc7

    SHA256

    add0938249e8a8cf37387e873784c0588c186add217fd48ee86ef6078cf86144

    SHA512

    222ff1c748600e8b4068747cf27c48f92c7641ef01ad1c80b3929844dde5bc09216fedc103b5a3a9edaf26017595a99ec7be541f676e2127f57525809917e1b1

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    0d13b1b57c6b67c483d4f9eebdc3b188

    SHA1

    c24e6e1be948d9d14267aafe63c68d3e7134cfc7

    SHA256

    add0938249e8a8cf37387e873784c0588c186add217fd48ee86ef6078cf86144

    SHA512

    222ff1c748600e8b4068747cf27c48f92c7641ef01ad1c80b3929844dde5bc09216fedc103b5a3a9edaf26017595a99ec7be541f676e2127f57525809917e1b1

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    0d13b1b57c6b67c483d4f9eebdc3b188

    SHA1

    c24e6e1be948d9d14267aafe63c68d3e7134cfc7

    SHA256

    add0938249e8a8cf37387e873784c0588c186add217fd48ee86ef6078cf86144

    SHA512

    222ff1c748600e8b4068747cf27c48f92c7641ef01ad1c80b3929844dde5bc09216fedc103b5a3a9edaf26017595a99ec7be541f676e2127f57525809917e1b1

  • memory/964-54-0x0000000075341000-0x0000000075343000-memory.dmp

    Filesize

    8KB