Analysis

  • max time kernel
    119s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    12-02-2022 06:45

General

  • Target

    0f0951a135ad2beeed527dc2fe941a4076ea999adfe33843e73243c16dbd2e2b.exe

  • Size

    79KB

  • MD5

    89d77670ed3f33009431fcc65d23b64d

  • SHA1

    59581de470ce92b52516fd324cbf7d44698e4c85

  • SHA256

    0f0951a135ad2beeed527dc2fe941a4076ea999adfe33843e73243c16dbd2e2b

  • SHA512

    a1ddb17d2e9e064fc3d9478875a5a988303cc585ba290d84281873e0901b82d8e1de88b1c0d68f7e458cbdfbc5b90ec45a5ab0a71cbce5ce402182f87de8ba69

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Sakula Payload 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f0951a135ad2beeed527dc2fe941a4076ea999adfe33843e73243c16dbd2e2b.exe
    "C:\Users\Admin\AppData\Local\Temp\0f0951a135ad2beeed527dc2fe941a4076ea999adfe33843e73243c16dbd2e2b.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1696
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:316
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\0f0951a135ad2beeed527dc2fe941a4076ea999adfe33843e73243c16dbd2e2b.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:968
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:1920

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    92cb7c155f385b7a99f9b9a5d890fe84

    SHA1

    89a14863f34509e8265e900ddbba8c8effb2172e

    SHA256

    1c4463dcb15193a6ac3f260eec840b60627b62dc01cd11f0a1b6659805d35a19

    SHA512

    ee6e6f120cadcfc61a1e9a63bb219bdb4ef1e37121dbd8b3de18c8a18ed0b802c5059cd0e0fef1bf601516b72d7d754c2a849f5bf59a0a9ef854c580abc09fe3

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    92cb7c155f385b7a99f9b9a5d890fe84

    SHA1

    89a14863f34509e8265e900ddbba8c8effb2172e

    SHA256

    1c4463dcb15193a6ac3f260eec840b60627b62dc01cd11f0a1b6659805d35a19

    SHA512

    ee6e6f120cadcfc61a1e9a63bb219bdb4ef1e37121dbd8b3de18c8a18ed0b802c5059cd0e0fef1bf601516b72d7d754c2a849f5bf59a0a9ef854c580abc09fe3

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    92cb7c155f385b7a99f9b9a5d890fe84

    SHA1

    89a14863f34509e8265e900ddbba8c8effb2172e

    SHA256

    1c4463dcb15193a6ac3f260eec840b60627b62dc01cd11f0a1b6659805d35a19

    SHA512

    ee6e6f120cadcfc61a1e9a63bb219bdb4ef1e37121dbd8b3de18c8a18ed0b802c5059cd0e0fef1bf601516b72d7d754c2a849f5bf59a0a9ef854c580abc09fe3

  • memory/1696-54-0x0000000076001000-0x0000000076003000-memory.dmp

    Filesize

    8KB