Analysis
-
max time kernel
156s -
max time network
168s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
12-02-2022 07:26
Static task
static1
Behavioral task
behavioral1
Sample
0d9ba3dfbff43dcbd41f599ee07d32e8187aee8a30a39afaeb05569ee8524a95.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
0d9ba3dfbff43dcbd41f599ee07d32e8187aee8a30a39afaeb05569ee8524a95.exe
Resource
win10v2004-en-20220113
General
-
Target
0d9ba3dfbff43dcbd41f599ee07d32e8187aee8a30a39afaeb05569ee8524a95.exe
-
Size
216KB
-
MD5
c5b3bacada50b868df88d0fcc7db8ca9
-
SHA1
d1a64536ed4a66e61bf9c42c0d664ad23b668590
-
SHA256
0d9ba3dfbff43dcbd41f599ee07d32e8187aee8a30a39afaeb05569ee8524a95
-
SHA512
c05f5f0b10c512ba8bcee7b2438d0f9267e5183be20c564b3d140ff6b0837767bc6eda0e6abd2dfedd78d2f8add2ffc2effbbfe24e5ffe32d20dda105bce45d7
Malware Config
Signatures
-
Sakula Payload 4 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula behavioral1/memory/1660-59-0x0000000000400000-0x0000000000420000-memory.dmp family_sakula behavioral1/memory/1148-60-0x0000000000400000-0x0000000000420000-memory.dmp family_sakula -
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 1148 MediaCenter.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 436 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
0d9ba3dfbff43dcbd41f599ee07d32e8187aee8a30a39afaeb05569ee8524a95.exepid process 1660 0d9ba3dfbff43dcbd41f599ee07d32e8187aee8a30a39afaeb05569ee8524a95.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
0d9ba3dfbff43dcbd41f599ee07d32e8187aee8a30a39afaeb05569ee8524a95.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 0d9ba3dfbff43dcbd41f599ee07d32e8187aee8a30a39afaeb05569ee8524a95.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
0d9ba3dfbff43dcbd41f599ee07d32e8187aee8a30a39afaeb05569ee8524a95.exedescription pid process Token: SeIncBasePriorityPrivilege 1660 0d9ba3dfbff43dcbd41f599ee07d32e8187aee8a30a39afaeb05569ee8524a95.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
0d9ba3dfbff43dcbd41f599ee07d32e8187aee8a30a39afaeb05569ee8524a95.execmd.exedescription pid process target process PID 1660 wrote to memory of 1148 1660 0d9ba3dfbff43dcbd41f599ee07d32e8187aee8a30a39afaeb05569ee8524a95.exe MediaCenter.exe PID 1660 wrote to memory of 1148 1660 0d9ba3dfbff43dcbd41f599ee07d32e8187aee8a30a39afaeb05569ee8524a95.exe MediaCenter.exe PID 1660 wrote to memory of 1148 1660 0d9ba3dfbff43dcbd41f599ee07d32e8187aee8a30a39afaeb05569ee8524a95.exe MediaCenter.exe PID 1660 wrote to memory of 1148 1660 0d9ba3dfbff43dcbd41f599ee07d32e8187aee8a30a39afaeb05569ee8524a95.exe MediaCenter.exe PID 1660 wrote to memory of 436 1660 0d9ba3dfbff43dcbd41f599ee07d32e8187aee8a30a39afaeb05569ee8524a95.exe cmd.exe PID 1660 wrote to memory of 436 1660 0d9ba3dfbff43dcbd41f599ee07d32e8187aee8a30a39afaeb05569ee8524a95.exe cmd.exe PID 1660 wrote to memory of 436 1660 0d9ba3dfbff43dcbd41f599ee07d32e8187aee8a30a39afaeb05569ee8524a95.exe cmd.exe PID 1660 wrote to memory of 436 1660 0d9ba3dfbff43dcbd41f599ee07d32e8187aee8a30a39afaeb05569ee8524a95.exe cmd.exe PID 436 wrote to memory of 796 436 cmd.exe PING.EXE PID 436 wrote to memory of 796 436 cmd.exe PING.EXE PID 436 wrote to memory of 796 436 cmd.exe PING.EXE PID 436 wrote to memory of 796 436 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d9ba3dfbff43dcbd41f599ee07d32e8187aee8a30a39afaeb05569ee8524a95.exe"C:\Users\Admin\AppData\Local\Temp\0d9ba3dfbff43dcbd41f599ee07d32e8187aee8a30a39afaeb05569ee8524a95.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:1148 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\0d9ba3dfbff43dcbd41f599ee07d32e8187aee8a30a39afaeb05569ee8524a95.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:796
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
3ec956d633ee8daa4592bc12749bb13a
SHA162994fce52459eae0248a21b2d83a3422766b34a
SHA256c5451847dd3a59d626cd24d7f1dab664d983cc9c8c9fb1cc51fbc7a43604805d
SHA512c365219f129a499ab2e605fae28d7e3c9903eed5da3468ac4970fe602293185a5ee9d55256b4ce4f27733c210da70df42360ffd26ad64f52e9b933651ab96e83
-
MD5
3ec956d633ee8daa4592bc12749bb13a
SHA162994fce52459eae0248a21b2d83a3422766b34a
SHA256c5451847dd3a59d626cd24d7f1dab664d983cc9c8c9fb1cc51fbc7a43604805d
SHA512c365219f129a499ab2e605fae28d7e3c9903eed5da3468ac4970fe602293185a5ee9d55256b4ce4f27733c210da70df42360ffd26ad64f52e9b933651ab96e83