Analysis

  • max time kernel
    162s
  • max time network
    187s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    12-02-2022 06:10

General

  • Target

    10a8e2efb42996436bf795292f879262f9b3b8af0e1ca529c71f37c027f2b20a.exe

  • Size

    36KB

  • MD5

    fa7484f2b3b8e299c7d347ff1beb318d

  • SHA1

    302f5bff981cf592fee7454132176ed44e224072

  • SHA256

    10a8e2efb42996436bf795292f879262f9b3b8af0e1ca529c71f37c027f2b20a

  • SHA512

    7eefc03b6505005894eef81541fcbb1cf2a67b0fd054d2f38af996b0c8aca15cf09e3a2e2d8c805e190c28dde9d825aeedf76057c8c351f48b37601c65923203

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Sakula Payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\10a8e2efb42996436bf795292f879262f9b3b8af0e1ca529c71f37c027f2b20a.exe
    "C:\Users\Admin\AppData\Local\Temp\10a8e2efb42996436bf795292f879262f9b3b8af0e1ca529c71f37c027f2b20a.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1704
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:1304
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\10a8e2efb42996436bf795292f879262f9b3b8af0e1ca529c71f37c027f2b20a.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:1668
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:1620

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    808e16bd97148ced5e853c59cc40f10e

    SHA1

    17d6b45a23d6bf2fac64fb712617f46dc0ad2fc1

    SHA256

    fe1ddb63ce77e00542e85596e8afb31a4cfcc9944a071e9b073087f4568bd325

    SHA512

    904ac575dc7d6962fb858c38620feadcb841ca45450ae56ac3e0e2a7df4301e52ef9a0e0e2632cfb5dac3600d2dd0e271d36e6abfd2e002ac1b1cb79bab8442b

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    808e16bd97148ced5e853c59cc40f10e

    SHA1

    17d6b45a23d6bf2fac64fb712617f46dc0ad2fc1

    SHA256

    fe1ddb63ce77e00542e85596e8afb31a4cfcc9944a071e9b073087f4568bd325

    SHA512

    904ac575dc7d6962fb858c38620feadcb841ca45450ae56ac3e0e2a7df4301e52ef9a0e0e2632cfb5dac3600d2dd0e271d36e6abfd2e002ac1b1cb79bab8442b

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    808e16bd97148ced5e853c59cc40f10e

    SHA1

    17d6b45a23d6bf2fac64fb712617f46dc0ad2fc1

    SHA256

    fe1ddb63ce77e00542e85596e8afb31a4cfcc9944a071e9b073087f4568bd325

    SHA512

    904ac575dc7d6962fb858c38620feadcb841ca45450ae56ac3e0e2a7df4301e52ef9a0e0e2632cfb5dac3600d2dd0e271d36e6abfd2e002ac1b1cb79bab8442b

  • memory/1304-61-0x0000000000E70000-0x0000000000E89000-memory.dmp

    Filesize

    100KB

  • memory/1304-63-0x0000000000070000-0x0000000000077000-memory.dmp

    Filesize

    28KB

  • memory/1704-55-0x0000000075F91000-0x0000000075F93000-memory.dmp

    Filesize

    8KB

  • memory/1704-56-0x0000000000850000-0x0000000000869000-memory.dmp

    Filesize

    100KB

  • memory/1704-62-0x0000000000070000-0x0000000000077000-memory.dmp

    Filesize

    28KB