Analysis

  • max time kernel
    117s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    12-02-2022 08:13

General

  • Target

    0b78536be3d07ea958f694addcd6d6e4927d06ecb60fd4d1cff9a0ef89902d4e.exe

  • Size

    80KB

  • MD5

    b1b201a603da837fdcca09dbb5325144

  • SHA1

    e4fec3e6abfd157a97f25ea924bf8b51ab6b9da6

  • SHA256

    0b78536be3d07ea958f694addcd6d6e4927d06ecb60fd4d1cff9a0ef89902d4e

  • SHA512

    348cedda6d7f0dd7f9d6c6adc88a20d6563081e44e94633630a4054126d46022a461f5b69b02346889ff7a5f5b2021e7964344ab8d39fa4523ee37f118d480f3

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Sakula Payload 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b78536be3d07ea958f694addcd6d6e4927d06ecb60fd4d1cff9a0ef89902d4e.exe
    "C:\Users\Admin\AppData\Local\Temp\0b78536be3d07ea958f694addcd6d6e4927d06ecb60fd4d1cff9a0ef89902d4e.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:892
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:1324
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\0b78536be3d07ea958f694addcd6d6e4927d06ecb60fd4d1cff9a0ef89902d4e.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:396
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:1672

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    3c4c63fa963a941bb3b6215728370ba3

    SHA1

    0d68b42e1423ac73c72e066dfd6e9ff098984717

    SHA256

    ace3d0d4d49dc08fd6c4faae71adc387685ca84e44b4e5aece08ab19cee940ac

    SHA512

    0b3db7aac4be74690f010ffe762aadb9865e709950d6821ee7e7dc8dae8f6c6c6670a48b69b8a6ea74584433338cf5a8051b4796ba202abeccddf07cbc9e800a

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    3c4c63fa963a941bb3b6215728370ba3

    SHA1

    0d68b42e1423ac73c72e066dfd6e9ff098984717

    SHA256

    ace3d0d4d49dc08fd6c4faae71adc387685ca84e44b4e5aece08ab19cee940ac

    SHA512

    0b3db7aac4be74690f010ffe762aadb9865e709950d6821ee7e7dc8dae8f6c6c6670a48b69b8a6ea74584433338cf5a8051b4796ba202abeccddf07cbc9e800a

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    3c4c63fa963a941bb3b6215728370ba3

    SHA1

    0d68b42e1423ac73c72e066dfd6e9ff098984717

    SHA256

    ace3d0d4d49dc08fd6c4faae71adc387685ca84e44b4e5aece08ab19cee940ac

    SHA512

    0b3db7aac4be74690f010ffe762aadb9865e709950d6821ee7e7dc8dae8f6c6c6670a48b69b8a6ea74584433338cf5a8051b4796ba202abeccddf07cbc9e800a

  • memory/892-54-0x0000000076451000-0x0000000076453000-memory.dmp

    Filesize

    8KB