Analysis

  • max time kernel
    129s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    12-02-2022 07:17

General

  • Target

    0dfa1f1f18bbce6bba43e0fcce4f17f16c2bc05b83a94dae0ab566f765dd3aff.exe

  • Size

    36KB

  • MD5

    5a1942bcfb3a4dd1f2e2c2715ae0ae69

  • SHA1

    3900751a9e09ec541d62947198eda044fbcf46e4

  • SHA256

    0dfa1f1f18bbce6bba43e0fcce4f17f16c2bc05b83a94dae0ab566f765dd3aff

  • SHA512

    f2ac846ddf3489719bc29513a5ba714412575bbcc3df16edd72bf8d2f593478cc3ae24c773701d3c5da3d751a81c85b31d49c8ae757b5a36224b87a4f2590450

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0dfa1f1f18bbce6bba43e0fcce4f17f16c2bc05b83a94dae0ab566f765dd3aff.exe
    "C:\Users\Admin\AppData\Local\Temp\0dfa1f1f18bbce6bba43e0fcce4f17f16c2bc05b83a94dae0ab566f765dd3aff.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4960
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:2240
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\0dfa1f1f18bbce6bba43e0fcce4f17f16c2bc05b83a94dae0ab566f765dd3aff.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4400
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:3948
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:4412
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2100

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    f5916fe55a38984482cd6621e0e3b3ef

    SHA1

    b32b37c8080d41bd69b85fe21032daed28259bb8

    SHA256

    252d15a860cf021e511f2274058fc65b2d1b3e5fff42c8f2877d0844326626c4

    SHA512

    a1053b668d517de922e2811f57a3e61bc11b6c99f58a08b288d5650be0ac7fb3e2a44718fdfefde7083ede1c49f9df600c712bd348245a91a29b1de3d8e38dfb

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    f5916fe55a38984482cd6621e0e3b3ef

    SHA1

    b32b37c8080d41bd69b85fe21032daed28259bb8

    SHA256

    252d15a860cf021e511f2274058fc65b2d1b3e5fff42c8f2877d0844326626c4

    SHA512

    a1053b668d517de922e2811f57a3e61bc11b6c99f58a08b288d5650be0ac7fb3e2a44718fdfefde7083ede1c49f9df600c712bd348245a91a29b1de3d8e38dfb

  • memory/4412-132-0x000002A159820000-0x000002A159830000-memory.dmp

    Filesize

    64KB

  • memory/4412-133-0x000002A159880000-0x000002A159890000-memory.dmp

    Filesize

    64KB

  • memory/4412-134-0x000002A15BF30000-0x000002A15BF34000-memory.dmp

    Filesize

    16KB