Analysis
-
max time kernel
143s -
max time network
161s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
12-02-2022 06:10
Static task
static1
Behavioral task
behavioral1
Sample
10ac255926bd75aa2bd37524c9ae90970c5f09469bda51a95e8a1931f72a4584.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
10ac255926bd75aa2bd37524c9ae90970c5f09469bda51a95e8a1931f72a4584.exe
Resource
win10v2004-en-20220112
General
-
Target
10ac255926bd75aa2bd37524c9ae90970c5f09469bda51a95e8a1931f72a4584.exe
-
Size
216KB
-
MD5
8aa4d4cda1fb1af072810b0fafbf91d2
-
SHA1
92cbad8131390c7b46927bb2799f1c767e59e6f8
-
SHA256
10ac255926bd75aa2bd37524c9ae90970c5f09469bda51a95e8a1931f72a4584
-
SHA512
41a11398fa5c6c588b5175d6fb49da975ec70aef25172f9e64524c7baaa20461dff86478bbf17fe50e043c878824df6a0791673743fa80ff28f471cc3aa0eec8
Malware Config
Signatures
-
Sakula Payload 4 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula behavioral1/memory/1480-58-0x0000000000400000-0x0000000000420000-memory.dmp family_sakula behavioral1/memory/1916-59-0x0000000000400000-0x0000000000420000-memory.dmp family_sakula -
suricata: ET MALWARE SUSPICIOUS UA (iexplore)
suricata: ET MALWARE SUSPICIOUS UA (iexplore)
-
suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1
suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1
-
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 1916 MediaCenter.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1988 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
10ac255926bd75aa2bd37524c9ae90970c5f09469bda51a95e8a1931f72a4584.exepid process 1480 10ac255926bd75aa2bd37524c9ae90970c5f09469bda51a95e8a1931f72a4584.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
10ac255926bd75aa2bd37524c9ae90970c5f09469bda51a95e8a1931f72a4584.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 10ac255926bd75aa2bd37524c9ae90970c5f09469bda51a95e8a1931f72a4584.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
10ac255926bd75aa2bd37524c9ae90970c5f09469bda51a95e8a1931f72a4584.exedescription pid process Token: SeIncBasePriorityPrivilege 1480 10ac255926bd75aa2bd37524c9ae90970c5f09469bda51a95e8a1931f72a4584.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
10ac255926bd75aa2bd37524c9ae90970c5f09469bda51a95e8a1931f72a4584.execmd.exedescription pid process target process PID 1480 wrote to memory of 1916 1480 10ac255926bd75aa2bd37524c9ae90970c5f09469bda51a95e8a1931f72a4584.exe MediaCenter.exe PID 1480 wrote to memory of 1916 1480 10ac255926bd75aa2bd37524c9ae90970c5f09469bda51a95e8a1931f72a4584.exe MediaCenter.exe PID 1480 wrote to memory of 1916 1480 10ac255926bd75aa2bd37524c9ae90970c5f09469bda51a95e8a1931f72a4584.exe MediaCenter.exe PID 1480 wrote to memory of 1916 1480 10ac255926bd75aa2bd37524c9ae90970c5f09469bda51a95e8a1931f72a4584.exe MediaCenter.exe PID 1480 wrote to memory of 1988 1480 10ac255926bd75aa2bd37524c9ae90970c5f09469bda51a95e8a1931f72a4584.exe cmd.exe PID 1480 wrote to memory of 1988 1480 10ac255926bd75aa2bd37524c9ae90970c5f09469bda51a95e8a1931f72a4584.exe cmd.exe PID 1480 wrote to memory of 1988 1480 10ac255926bd75aa2bd37524c9ae90970c5f09469bda51a95e8a1931f72a4584.exe cmd.exe PID 1480 wrote to memory of 1988 1480 10ac255926bd75aa2bd37524c9ae90970c5f09469bda51a95e8a1931f72a4584.exe cmd.exe PID 1988 wrote to memory of 1028 1988 cmd.exe PING.EXE PID 1988 wrote to memory of 1028 1988 cmd.exe PING.EXE PID 1988 wrote to memory of 1028 1988 cmd.exe PING.EXE PID 1988 wrote to memory of 1028 1988 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\10ac255926bd75aa2bd37524c9ae90970c5f09469bda51a95e8a1931f72a4584.exe"C:\Users\Admin\AppData\Local\Temp\10ac255926bd75aa2bd37524c9ae90970c5f09469bda51a95e8a1931f72a4584.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:1916 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\10ac255926bd75aa2bd37524c9ae90970c5f09469bda51a95e8a1931f72a4584.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1028
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
0de45f277008fd95105e69ae702da357
SHA15a1beefc0a2f63e6c0db1a1451944e7ac3deda93
SHA256541d5605018e8cc01aaf1721fe969510595a513762b23282af1aff16270f36b6
SHA5121a9123934084706aa8091d2d6b51146a37e4734fef3428189523202349f05bfff757fda83f4561724d4e41470d2e1b103fec435fa0fec41b0a772350332fc06f
-
MD5
0de45f277008fd95105e69ae702da357
SHA15a1beefc0a2f63e6c0db1a1451944e7ac3deda93
SHA256541d5605018e8cc01aaf1721fe969510595a513762b23282af1aff16270f36b6
SHA5121a9123934084706aa8091d2d6b51146a37e4734fef3428189523202349f05bfff757fda83f4561724d4e41470d2e1b103fec435fa0fec41b0a772350332fc06f