Analysis

  • max time kernel
    124s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    12-02-2022 07:05

General

  • Target

    0e8f526630ad080d03dc596e79076e0fa9006a8c8ba0fa53336a700032ea15bc.exe

  • Size

    101KB

  • MD5

    7b0439c26e692a5edc474f82df20b82c

  • SHA1

    73416fd5c707c7719082358f40a3d5598d54e037

  • SHA256

    0e8f526630ad080d03dc596e79076e0fa9006a8c8ba0fa53336a700032ea15bc

  • SHA512

    89b901f20b402f5899b0b4898a4bd205d91b88cea3b885636c6012f8387fe5ebd409a2c35a259e2e44f95c9d5044f79f7fc890a2f51c0a4a8a954313a8d66809

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Sakula Payload 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e8f526630ad080d03dc596e79076e0fa9006a8c8ba0fa53336a700032ea15bc.exe
    "C:\Users\Admin\AppData\Local\Temp\0e8f526630ad080d03dc596e79076e0fa9006a8c8ba0fa53336a700032ea15bc.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:960
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:1028
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\0e8f526630ad080d03dc596e79076e0fa9006a8c8ba0fa53336a700032ea15bc.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:432
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:1796

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    bcc399b6d00b731b5dd5d2aeee78268c

    SHA1

    b6f4a3a4285359a92c8be6a56c6a28391252b17d

    SHA256

    d8c4193f28f15f178e1cd54c8905d449bf172adfc905a3b15047093d16e824c4

    SHA512

    9ca0e7b3556f277202915e8b284ff3a87f876a6b10b79b6ef003d8a4b850a6a2e04d5c4030868b11749c66f180199160622ec508d57304cc77dfa85647608328

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    bcc399b6d00b731b5dd5d2aeee78268c

    SHA1

    b6f4a3a4285359a92c8be6a56c6a28391252b17d

    SHA256

    d8c4193f28f15f178e1cd54c8905d449bf172adfc905a3b15047093d16e824c4

    SHA512

    9ca0e7b3556f277202915e8b284ff3a87f876a6b10b79b6ef003d8a4b850a6a2e04d5c4030868b11749c66f180199160622ec508d57304cc77dfa85647608328

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    bcc399b6d00b731b5dd5d2aeee78268c

    SHA1

    b6f4a3a4285359a92c8be6a56c6a28391252b17d

    SHA256

    d8c4193f28f15f178e1cd54c8905d449bf172adfc905a3b15047093d16e824c4

    SHA512

    9ca0e7b3556f277202915e8b284ff3a87f876a6b10b79b6ef003d8a4b850a6a2e04d5c4030868b11749c66f180199160622ec508d57304cc77dfa85647608328

  • memory/960-54-0x0000000076151000-0x0000000076153000-memory.dmp

    Filesize

    8KB