Analysis

  • max time kernel
    139s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    12-02-2022 08:09

General

  • Target

    0b980903ea44bd4841cffd619cb6f740b2c0ddbd4a4dfda4a94cce2dd9875614.exe

  • Size

    60KB

  • MD5

    f26ca365fda9944bda68f1c88431ac26

  • SHA1

    3e755ad3d1ef6589274e7ef64b0666ad640782a2

  • SHA256

    0b980903ea44bd4841cffd619cb6f740b2c0ddbd4a4dfda4a94cce2dd9875614

  • SHA512

    c8aad45c45889f283678659dbf7ab257e47d08dd5d88da5286f9cff8c3486bdd2facee4205f27e6868862fd2b8d381520191f3bfa2c8ebb6f436fb62ad62a941

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b980903ea44bd4841cffd619cb6f740b2c0ddbd4a4dfda4a94cce2dd9875614.exe
    "C:\Users\Admin\AppData\Local\Temp\0b980903ea44bd4841cffd619cb6f740b2c0ddbd4a4dfda4a94cce2dd9875614.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1392
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:1648
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\0b980903ea44bd4841cffd619cb6f740b2c0ddbd4a4dfda4a94cce2dd9875614.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1100
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:3476
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:1544
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:4920

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    977835f144ea752d45fa487a319f022f

    SHA1

    91526ad4dd842385a6ddaf542e95702445104193

    SHA256

    66f74d7d414baa0cef81eda332a11a07d367b9a08483d1fe2c3327f859cbc69a

    SHA512

    dbae7e1f8f8e221f505d4f1cd43e48eae11bc64180ae41b9da41fce2bb0d0c71297c5667cfc5fd7b8de08153ed787075b243f5e1d6c190396fc34e9841f52eea

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    977835f144ea752d45fa487a319f022f

    SHA1

    91526ad4dd842385a6ddaf542e95702445104193

    SHA256

    66f74d7d414baa0cef81eda332a11a07d367b9a08483d1fe2c3327f859cbc69a

    SHA512

    dbae7e1f8f8e221f505d4f1cd43e48eae11bc64180ae41b9da41fce2bb0d0c71297c5667cfc5fd7b8de08153ed787075b243f5e1d6c190396fc34e9841f52eea

  • memory/1544-132-0x00000228DA7A0000-0x00000228DA7B0000-memory.dmp

    Filesize

    64KB

  • memory/1544-133-0x00000228DAF60000-0x00000228DAF70000-memory.dmp

    Filesize

    64KB

  • memory/1544-134-0x00000228DDB80000-0x00000228DDB84000-memory.dmp

    Filesize

    16KB