Analysis

  • max time kernel
    148s
  • max time network
    176s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    12-02-2022 06:44

General

  • Target

    0f12374a44a3f27f5999149c608bf121027d64dcc54fd73552f6888d65304ed9.exe

  • Size

    35KB

  • MD5

    b15e6b2f0a0108617f4c67d38bb4189c

  • SHA1

    8e1a5e14c0e96d82be1e53b00c8e94bc513e0b65

  • SHA256

    0f12374a44a3f27f5999149c608bf121027d64dcc54fd73552f6888d65304ed9

  • SHA512

    84623967764d10af9319ab1d535d68829230640faf97ad8948edc46a1d1e7b854840ca03326300f99fc437d6862e7322ba60c6f7c6aa868eccc6918a618dbe44

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f12374a44a3f27f5999149c608bf121027d64dcc54fd73552f6888d65304ed9.exe
    "C:\Users\Admin\AppData\Local\Temp\0f12374a44a3f27f5999149c608bf121027d64dcc54fd73552f6888d65304ed9.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1180
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:1204
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\0f12374a44a3f27f5999149c608bf121027d64dcc54fd73552f6888d65304ed9.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:1708
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:1012

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    f02c6540275c9a9702d59a3d3f7c4c13

    SHA1

    d89fb1902a66892ab91dc6d97ce9c00819132f7a

    SHA256

    8d927116a7ccb67dec7a07a8080c32a62d3e28eee3551f3a22449736285e3097

    SHA512

    243661f2f972740c94ee3ee2af3ae94ceea7c435df9e3671af6fffaf7ce6f7f55fb98fec806df2eb7d216f2a6d2b23ac824479f0c785cc1b75c4fc4e2fd57f50

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    f02c6540275c9a9702d59a3d3f7c4c13

    SHA1

    d89fb1902a66892ab91dc6d97ce9c00819132f7a

    SHA256

    8d927116a7ccb67dec7a07a8080c32a62d3e28eee3551f3a22449736285e3097

    SHA512

    243661f2f972740c94ee3ee2af3ae94ceea7c435df9e3671af6fffaf7ce6f7f55fb98fec806df2eb7d216f2a6d2b23ac824479f0c785cc1b75c4fc4e2fd57f50

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    f02c6540275c9a9702d59a3d3f7c4c13

    SHA1

    d89fb1902a66892ab91dc6d97ce9c00819132f7a

    SHA256

    8d927116a7ccb67dec7a07a8080c32a62d3e28eee3551f3a22449736285e3097

    SHA512

    243661f2f972740c94ee3ee2af3ae94ceea7c435df9e3671af6fffaf7ce6f7f55fb98fec806df2eb7d216f2a6d2b23ac824479f0c785cc1b75c4fc4e2fd57f50

  • memory/1180-55-0x0000000075831000-0x0000000075833000-memory.dmp

    Filesize

    8KB