Analysis

  • max time kernel
    152s
  • max time network
    162s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    12-02-2022 06:09

General

  • Target

    10b2bf6aa046146845d968f2350af50215a109034b79deb1375385d69f0b8ab4.exe

  • Size

    216KB

  • MD5

    22a8f741f2e94c89d3d95fd05fc1dfba

  • SHA1

    6c50604a4e989d4cb41a32e1518568bcba1ee4e2

  • SHA256

    10b2bf6aa046146845d968f2350af50215a109034b79deb1375385d69f0b8ab4

  • SHA512

    0c20891241dd2bdda591abf7bf2935616bd6be45c72cd9f653a26ae8c16738e884ac096e86a43926a4b749a9b29a5e9922f5e039be1d8480f2dd6f2266634698

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Sakula Payload 4 IoCs
  • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    suricata: ET MALWARE SUSPICIOUS UA (iexplore)

  • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\10b2bf6aa046146845d968f2350af50215a109034b79deb1375385d69f0b8ab4.exe
    "C:\Users\Admin\AppData\Local\Temp\10b2bf6aa046146845d968f2350af50215a109034b79deb1375385d69f0b8ab4.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1560
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:528
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\10b2bf6aa046146845d968f2350af50215a109034b79deb1375385d69f0b8ab4.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:616
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:1164

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    36c9f22ddc7307253fc493d13af59cbd

    SHA1

    61219fdb30fe2d7581f617d90bceda6108ac9d1c

    SHA256

    3340c1f8c72426a5b1bc7c8ea89811b7416db42a5b8ca1ccb7a7f29a9d07ee61

    SHA512

    97d09b0ab5a30791deb09e2d6f45f45c365af01ee136f2251967f35e7ff90c56d63e5382aa4a57865e21caec9fdc3891b6293e6cda40af525aad93dd28b43be6

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    36c9f22ddc7307253fc493d13af59cbd

    SHA1

    61219fdb30fe2d7581f617d90bceda6108ac9d1c

    SHA256

    3340c1f8c72426a5b1bc7c8ea89811b7416db42a5b8ca1ccb7a7f29a9d07ee61

    SHA512

    97d09b0ab5a30791deb09e2d6f45f45c365af01ee136f2251967f35e7ff90c56d63e5382aa4a57865e21caec9fdc3891b6293e6cda40af525aad93dd28b43be6

  • memory/528-59-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/1560-54-0x0000000076121000-0x0000000076123000-memory.dmp

    Filesize

    8KB

  • memory/1560-58-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB