Analysis

  • max time kernel
    120s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    12-02-2022 07:24

General

  • Target

    0da8b8902bf760fbe3801b284690e8af76fedf683d5363b52dd8e82aae3dccbf.exe

  • Size

    36KB

  • MD5

    1ce6a4b53771e67484f81742b23cdb4b

  • SHA1

    7f0d55ad3b5a3ba62caaebe5578185465de2f845

  • SHA256

    0da8b8902bf760fbe3801b284690e8af76fedf683d5363b52dd8e82aae3dccbf

  • SHA512

    5da9dbbefc78efe55d59e60e54ba76b76ed265821910885a8262c27e218b2eeb47862d4d02409afcc9726481e1d907c72ad65a819a7a532d7963a66f24ab3673

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0da8b8902bf760fbe3801b284690e8af76fedf683d5363b52dd8e82aae3dccbf.exe
    "C:\Users\Admin\AppData\Local\Temp\0da8b8902bf760fbe3801b284690e8af76fedf683d5363b52dd8e82aae3dccbf.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1892
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:1224
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\0da8b8902bf760fbe3801b284690e8af76fedf683d5363b52dd8e82aae3dccbf.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:1084
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:1060

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    00d367e83fcefd14e6725b4dabe4a8fa

    SHA1

    64b05be5c91173d3c68ff6f0c31c8877bd6de861

    SHA256

    650b10b10c819c8e7eebb8592f9745d16b6c5627dda35b5ffc4b9db4a2c30ddc

    SHA512

    d2212448a66416e1fa6d05d2a2b73c5ccf6504c7ed77ae0f52d642891ccea78d5bffc0201a4bf2476f1f12edfaf4a771a332440b4d7fa41a39395c9f0888725d

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    00d367e83fcefd14e6725b4dabe4a8fa

    SHA1

    64b05be5c91173d3c68ff6f0c31c8877bd6de861

    SHA256

    650b10b10c819c8e7eebb8592f9745d16b6c5627dda35b5ffc4b9db4a2c30ddc

    SHA512

    d2212448a66416e1fa6d05d2a2b73c5ccf6504c7ed77ae0f52d642891ccea78d5bffc0201a4bf2476f1f12edfaf4a771a332440b4d7fa41a39395c9f0888725d

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    00d367e83fcefd14e6725b4dabe4a8fa

    SHA1

    64b05be5c91173d3c68ff6f0c31c8877bd6de861

    SHA256

    650b10b10c819c8e7eebb8592f9745d16b6c5627dda35b5ffc4b9db4a2c30ddc

    SHA512

    d2212448a66416e1fa6d05d2a2b73c5ccf6504c7ed77ae0f52d642891ccea78d5bffc0201a4bf2476f1f12edfaf4a771a332440b4d7fa41a39395c9f0888725d

  • memory/1892-54-0x0000000076071000-0x0000000076073000-memory.dmp

    Filesize

    8KB