Analysis

  • max time kernel
    140s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    12-02-2022 07:06

General

  • Target

    0e8874bbbb54fef542eae0dc132117ebdddfd42c12f948db49f5d73d295fc347.exe

  • Size

    89KB

  • MD5

    60b4c74024f74be80f71f35a112422c3

  • SHA1

    7c8d0d21c94b14a6557fdf4d576a596a76bc87c6

  • SHA256

    0e8874bbbb54fef542eae0dc132117ebdddfd42c12f948db49f5d73d295fc347

  • SHA512

    329cbc3bb5bef5e105a032a10dc961bffb1b87e42ebbc9d4f4eee43ab6e99c88199cdf49ea5f3222c7dbbb240e020b02f386e77dcfe2babe37a5dee3ff4c6063

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Sakula Payload 2 IoCs
  • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    suricata: ET MALWARE SUSPICIOUS UA (iexplore)

  • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e8874bbbb54fef542eae0dc132117ebdddfd42c12f948db49f5d73d295fc347.exe
    "C:\Users\Admin\AppData\Local\Temp\0e8874bbbb54fef542eae0dc132117ebdddfd42c12f948db49f5d73d295fc347.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:268
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:472
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\0e8874bbbb54fef542eae0dc132117ebdddfd42c12f948db49f5d73d295fc347.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:820
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:1976

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    041ac0e38b1355bdd5c985546d76ee09

    SHA1

    24a344d52336ada5f04726c9cabe3905cf7d80d1

    SHA256

    ea66d674c158abcd98b9045a61e30f4963de652719e4b5d84ec44ff847fe33f9

    SHA512

    0b14a5e4d5e62a8ef91076572f6898b8a07c43da3976799d39096d4058a518474e5f7e73d4f7cb52382f1ebedffc3d6564da90741953932e7a0a8bc60a99cc44

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    041ac0e38b1355bdd5c985546d76ee09

    SHA1

    24a344d52336ada5f04726c9cabe3905cf7d80d1

    SHA256

    ea66d674c158abcd98b9045a61e30f4963de652719e4b5d84ec44ff847fe33f9

    SHA512

    0b14a5e4d5e62a8ef91076572f6898b8a07c43da3976799d39096d4058a518474e5f7e73d4f7cb52382f1ebedffc3d6564da90741953932e7a0a8bc60a99cc44

  • memory/268-54-0x0000000074F01000-0x0000000074F03000-memory.dmp

    Filesize

    8KB