Analysis
-
max time kernel
167s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
12-02-2022 08:12
Static task
static1
Behavioral task
behavioral1
Sample
0b81270647cddbc06c91b6ec0f0393d15ee359964f3e42c6158a5b2a9ba25246.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
0b81270647cddbc06c91b6ec0f0393d15ee359964f3e42c6158a5b2a9ba25246.exe
Resource
win10v2004-en-20220112
General
-
Target
0b81270647cddbc06c91b6ec0f0393d15ee359964f3e42c6158a5b2a9ba25246.exe
-
Size
151KB
-
MD5
3483b9547d5b22867714028f92488997
-
SHA1
e0df5a0097691c4758a3ce6ccce3f0e29c1ac0ea
-
SHA256
0b81270647cddbc06c91b6ec0f0393d15ee359964f3e42c6158a5b2a9ba25246
-
SHA512
49c3fe5111edc4a09237030a9fe7d317db0a251589f2d4e7e3e0f1a44cd2011a0b0a8806507dfaf05e3b47c1842c05ebbbec7eee2153ed61c4cbd1ff452ec84d
Malware Config
Signatures
-
Sakula Payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula -
suricata: ET MALWARE SUSPICIOUS UA (iexplore)
suricata: ET MALWARE SUSPICIOUS UA (iexplore)
-
suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1
suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1
-
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 3108 MediaCenter.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
0b81270647cddbc06c91b6ec0f0393d15ee359964f3e42c6158a5b2a9ba25246.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation 0b81270647cddbc06c91b6ec0f0393d15ee359964f3e42c6158a5b2a9ba25246.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
0b81270647cddbc06c91b6ec0f0393d15ee359964f3e42c6158a5b2a9ba25246.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 0b81270647cddbc06c91b6ec0f0393d15ee359964f3e42c6158a5b2a9ba25246.exe -
Drops file in Windows directory 3 IoCs
Processes:
TiWorker.exesvchost.exedescription ioc process File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe File opened for modification C:\Windows\WinSxS\pending.xml TiWorker.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\DeliveryOptimization\State\keyValueLKG.dat svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
MusNotifyIcon.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MusNotifyIcon.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MusNotifyIcon.exe -
Modifies data under HKEY_USERS 51 IoCs
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\DODownloadMode = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCdnBytes = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\GeoVersion_EndpointFullUri = "https://geover.prod.do.dsp.mp.microsoft.com/geoversion" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CDNConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UplinkUsageBps = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "0.000000" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "0.006743" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Settings svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyInternetBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCacheHostBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyGroupBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\KVFileExpirationTime = "132893037783754446" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CacheSizeBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UplinkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadCount = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "1.079210" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\DownloadMode_BackCompat = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PeerInfoCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadRatePct = "100" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PriorityDownloadCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "4112" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PriorityDownloadPendingCount = "0" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadMonthlyInternetBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\GroupConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\InternetConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownlinkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownlinkUsageBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\NormalDownloadPendingCount = "0" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\Geo_EndpointFullUri = "https://geo.prod.do.dsp.mp.microsoft.com/geo" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\SwarmCount = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\LANConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\BkDownloadRatePct = "45" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthlyUploadRestriction = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\NormalDownloadCount = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "1.136395" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "4224" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "3904" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadMonthlyLanBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthID = "2" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\LinkLocalConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\SwarmCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyLanBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyLinkLocalBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateFrBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateFrCnt = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkCnt = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\FrDownloadRatePct = "90" svchost.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
TiWorker.exedescription pid process Token: SeSecurityPrivilege 2968 TiWorker.exe Token: SeRestorePrivilege 2968 TiWorker.exe Token: SeBackupPrivilege 2968 TiWorker.exe Token: SeBackupPrivilege 2968 TiWorker.exe Token: SeRestorePrivilege 2968 TiWorker.exe Token: SeSecurityPrivilege 2968 TiWorker.exe Token: SeBackupPrivilege 2968 TiWorker.exe Token: SeRestorePrivilege 2968 TiWorker.exe Token: SeSecurityPrivilege 2968 TiWorker.exe Token: SeBackupPrivilege 2968 TiWorker.exe Token: SeRestorePrivilege 2968 TiWorker.exe Token: SeSecurityPrivilege 2968 TiWorker.exe Token: SeBackupPrivilege 2968 TiWorker.exe Token: SeRestorePrivilege 2968 TiWorker.exe Token: SeSecurityPrivilege 2968 TiWorker.exe Token: SeBackupPrivilege 2968 TiWorker.exe Token: SeRestorePrivilege 2968 TiWorker.exe Token: SeSecurityPrivilege 2968 TiWorker.exe Token: SeBackupPrivilege 2968 TiWorker.exe Token: SeRestorePrivilege 2968 TiWorker.exe Token: SeSecurityPrivilege 2968 TiWorker.exe Token: SeBackupPrivilege 2968 TiWorker.exe Token: SeRestorePrivilege 2968 TiWorker.exe Token: SeSecurityPrivilege 2968 TiWorker.exe Token: SeBackupPrivilege 2968 TiWorker.exe Token: SeRestorePrivilege 2968 TiWorker.exe Token: SeSecurityPrivilege 2968 TiWorker.exe Token: SeBackupPrivilege 2968 TiWorker.exe Token: SeRestorePrivilege 2968 TiWorker.exe Token: SeSecurityPrivilege 2968 TiWorker.exe Token: SeBackupPrivilege 2968 TiWorker.exe Token: SeRestorePrivilege 2968 TiWorker.exe Token: SeSecurityPrivilege 2968 TiWorker.exe Token: SeBackupPrivilege 2968 TiWorker.exe Token: SeRestorePrivilege 2968 TiWorker.exe Token: SeSecurityPrivilege 2968 TiWorker.exe Token: SeBackupPrivilege 2968 TiWorker.exe Token: SeRestorePrivilege 2968 TiWorker.exe Token: SeSecurityPrivilege 2968 TiWorker.exe Token: SeBackupPrivilege 2968 TiWorker.exe Token: SeRestorePrivilege 2968 TiWorker.exe Token: SeSecurityPrivilege 2968 TiWorker.exe Token: SeBackupPrivilege 2968 TiWorker.exe Token: SeRestorePrivilege 2968 TiWorker.exe Token: SeSecurityPrivilege 2968 TiWorker.exe Token: SeBackupPrivilege 2968 TiWorker.exe Token: SeRestorePrivilege 2968 TiWorker.exe Token: SeSecurityPrivilege 2968 TiWorker.exe Token: SeBackupPrivilege 2968 TiWorker.exe Token: SeRestorePrivilege 2968 TiWorker.exe Token: SeSecurityPrivilege 2968 TiWorker.exe Token: SeBackupPrivilege 2968 TiWorker.exe Token: SeRestorePrivilege 2968 TiWorker.exe Token: SeSecurityPrivilege 2968 TiWorker.exe Token: SeBackupPrivilege 2968 TiWorker.exe Token: SeRestorePrivilege 2968 TiWorker.exe Token: SeSecurityPrivilege 2968 TiWorker.exe Token: SeBackupPrivilege 2968 TiWorker.exe Token: SeRestorePrivilege 2968 TiWorker.exe Token: SeSecurityPrivilege 2968 TiWorker.exe Token: SeBackupPrivilege 2968 TiWorker.exe Token: SeRestorePrivilege 2968 TiWorker.exe Token: SeSecurityPrivilege 2968 TiWorker.exe Token: SeBackupPrivilege 2968 TiWorker.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
0b81270647cddbc06c91b6ec0f0393d15ee359964f3e42c6158a5b2a9ba25246.execmd.exedescription pid process target process PID 456 wrote to memory of 3108 456 0b81270647cddbc06c91b6ec0f0393d15ee359964f3e42c6158a5b2a9ba25246.exe MediaCenter.exe PID 456 wrote to memory of 3108 456 0b81270647cddbc06c91b6ec0f0393d15ee359964f3e42c6158a5b2a9ba25246.exe MediaCenter.exe PID 456 wrote to memory of 3108 456 0b81270647cddbc06c91b6ec0f0393d15ee359964f3e42c6158a5b2a9ba25246.exe MediaCenter.exe PID 456 wrote to memory of 3092 456 0b81270647cddbc06c91b6ec0f0393d15ee359964f3e42c6158a5b2a9ba25246.exe cmd.exe PID 456 wrote to memory of 3092 456 0b81270647cddbc06c91b6ec0f0393d15ee359964f3e42c6158a5b2a9ba25246.exe cmd.exe PID 456 wrote to memory of 3092 456 0b81270647cddbc06c91b6ec0f0393d15ee359964f3e42c6158a5b2a9ba25246.exe cmd.exe PID 3092 wrote to memory of 2820 3092 cmd.exe PING.EXE PID 3092 wrote to memory of 2820 3092 cmd.exe PING.EXE PID 3092 wrote to memory of 2820 3092 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b81270647cddbc06c91b6ec0f0393d15ee359964f3e42c6158a5b2a9ba25246.exe"C:\Users\Admin\AppData\Local\Temp\0b81270647cddbc06c91b6ec0f0393d15ee359964f3e42c6158a5b2a9ba25246.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:3108 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\0b81270647cddbc06c91b6ec0f0393d15ee359964f3e42c6158a5b2a9ba25246.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:2820
-
C:\Windows\system32\MusNotifyIcon.exe%systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 131⤵
- Checks processor information in registry
PID:3232
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:2088
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2968
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
853deb87a1ba94a3d99d884b9b2512fe
SHA1de053948082debe85e9b58ac9b8771f4a6b2ea9d
SHA256394d64b511e9d073c9d71c8a3bc71da556ff5c3031c6b838b8106095ade42361
SHA512f1b81c7f5223b0c1280cf8a41122147abdafab8558d0ad451d1c70b1741f853f604dc3ec3c0fee33e862f1d4336ceaf28e64f1a0ac7104f70b949ca37d4ace58
-
MD5
853deb87a1ba94a3d99d884b9b2512fe
SHA1de053948082debe85e9b58ac9b8771f4a6b2ea9d
SHA256394d64b511e9d073c9d71c8a3bc71da556ff5c3031c6b838b8106095ade42361
SHA512f1b81c7f5223b0c1280cf8a41122147abdafab8558d0ad451d1c70b1741f853f604dc3ec3c0fee33e862f1d4336ceaf28e64f1a0ac7104f70b949ca37d4ace58