Analysis

  • max time kernel
    134s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    12-02-2022 07:00

General

  • Target

    0edc26e68371e880e169d989f7f7ae4e7d52ea800af17bd530f4f7b9be50d929.exe

  • Size

    92KB

  • MD5

    c947c5f14492fbadab7a010d092c40e5

  • SHA1

    f487dfc12b7d6fe69367ba16d9f84940fdf2b59c

  • SHA256

    0edc26e68371e880e169d989f7f7ae4e7d52ea800af17bd530f4f7b9be50d929

  • SHA512

    11e60d9d04c0e86cc162d5d57d303c184ba75085eec3d4bdf028b32cd046b739cab2e73ebe75871e07be5321c47435440840e639c2613d78b336b5ec9deab53d

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Sakula Payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0edc26e68371e880e169d989f7f7ae4e7d52ea800af17bd530f4f7b9be50d929.exe
    "C:\Users\Admin\AppData\Local\Temp\0edc26e68371e880e169d989f7f7ae4e7d52ea800af17bd530f4f7b9be50d929.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1652
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:1620
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\0edc26e68371e880e169d989f7f7ae4e7d52ea800af17bd530f4f7b9be50d929.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:752
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:872

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    b89c2e08dfec0ca077a42bd723fed99a

    SHA1

    2574a69bb282be415dfaa478c3db28c5ce09c884

    SHA256

    f00b09c520083bec64b372a0e61f21d152ec7f1638a9332792d85fcafce6097f

    SHA512

    d83a88b5903d66ebe8cdcd818b6aab3653bf0dd8b404d0ca5c378ca83ae1d54f8bec0482d00e309afd82a309e369acc97b4d533e20f13b620eebabde0b4d28aa

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    b89c2e08dfec0ca077a42bd723fed99a

    SHA1

    2574a69bb282be415dfaa478c3db28c5ce09c884

    SHA256

    f00b09c520083bec64b372a0e61f21d152ec7f1638a9332792d85fcafce6097f

    SHA512

    d83a88b5903d66ebe8cdcd818b6aab3653bf0dd8b404d0ca5c378ca83ae1d54f8bec0482d00e309afd82a309e369acc97b4d533e20f13b620eebabde0b4d28aa

  • memory/1652-55-0x0000000076641000-0x0000000076643000-memory.dmp

    Filesize

    8KB