Analysis

  • max time kernel
    156s
  • max time network
    181s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    12-02-2022 07:18

General

  • Target

    0df866fb86b8c005c8a1203793532fb605a6e7f0880d85ce99abed58e15aba61.exe

  • Size

    36KB

  • MD5

    93f7152ef1a39ac22d4dd4a91ac4c7d8

  • SHA1

    77cd97ce5baf5d09075c274c22dd4e2eb6648381

  • SHA256

    0df866fb86b8c005c8a1203793532fb605a6e7f0880d85ce99abed58e15aba61

  • SHA512

    ced2b0433ad0f193a8742fa5df01f2c7c5551d8ae6fd38acf1399f2ded045f542b54ed2e8b26b1cd1056052398a8de331d72e16c09343d4caf114c7047c8ee75

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0df866fb86b8c005c8a1203793532fb605a6e7f0880d85ce99abed58e15aba61.exe
    "C:\Users\Admin\AppData\Local\Temp\0df866fb86b8c005c8a1203793532fb605a6e7f0880d85ce99abed58e15aba61.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:732
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:948
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\0df866fb86b8c005c8a1203793532fb605a6e7f0880d85ce99abed58e15aba61.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:1508
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:940

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    aa569b3b0ca882ff99f32a9aae95d8f9

    SHA1

    048490f5e46e8313457f2a88ec0a41bbd62de9e3

    SHA256

    42128e9756a7f5ff99815da2696b34e0702c4b236938b5675bb2d5da66d1f038

    SHA512

    5d9935f6710ba6c19acf7250f15c21e67b72fdb4c3367b49d5246d760ccd4a4cbdbe4ea6d7c26f044b500204ee8fdf0d7630deb2161d79dc6f6866cebd23c866

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    aa569b3b0ca882ff99f32a9aae95d8f9

    SHA1

    048490f5e46e8313457f2a88ec0a41bbd62de9e3

    SHA256

    42128e9756a7f5ff99815da2696b34e0702c4b236938b5675bb2d5da66d1f038

    SHA512

    5d9935f6710ba6c19acf7250f15c21e67b72fdb4c3367b49d5246d760ccd4a4cbdbe4ea6d7c26f044b500204ee8fdf0d7630deb2161d79dc6f6866cebd23c866

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    aa569b3b0ca882ff99f32a9aae95d8f9

    SHA1

    048490f5e46e8313457f2a88ec0a41bbd62de9e3

    SHA256

    42128e9756a7f5ff99815da2696b34e0702c4b236938b5675bb2d5da66d1f038

    SHA512

    5d9935f6710ba6c19acf7250f15c21e67b72fdb4c3367b49d5246d760ccd4a4cbdbe4ea6d7c26f044b500204ee8fdf0d7630deb2161d79dc6f6866cebd23c866

  • memory/732-55-0x0000000076B81000-0x0000000076B83000-memory.dmp

    Filesize

    8KB