Analysis
-
max time kernel
156s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
12-02-2022 08:22
Static task
static1
Behavioral task
behavioral1
Sample
0b375c7fdd1f3f4d855c7a80bd3a09f369890cfd2090d277d38cf1f90cc6bb1e.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
0b375c7fdd1f3f4d855c7a80bd3a09f369890cfd2090d277d38cf1f90cc6bb1e.exe
Resource
win10v2004-en-20220113
General
-
Target
0b375c7fdd1f3f4d855c7a80bd3a09f369890cfd2090d277d38cf1f90cc6bb1e.exe
-
Size
100KB
-
MD5
6c2d439e3f35e3be600aea3221ce1c79
-
SHA1
96d91be81d78ce94a112f3c84a34457558946b3b
-
SHA256
0b375c7fdd1f3f4d855c7a80bd3a09f369890cfd2090d277d38cf1f90cc6bb1e
-
SHA512
4ee5cfbe8228a2f79b35f5a7b623db7f6a012c93ebb8518a2e26534a94596d15333f9659e37e30dfc911524af0fac8f7f28174bea0c8f1e60aa8af90be428548
Malware Config
Signatures
-
Sakula Payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula -
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 1984 MediaCenter.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
0b375c7fdd1f3f4d855c7a80bd3a09f369890cfd2090d277d38cf1f90cc6bb1e.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 0b375c7fdd1f3f4d855c7a80bd3a09f369890cfd2090d277d38cf1f90cc6bb1e.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
0b375c7fdd1f3f4d855c7a80bd3a09f369890cfd2090d277d38cf1f90cc6bb1e.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 0b375c7fdd1f3f4d855c7a80bd3a09f369890cfd2090d277d38cf1f90cc6bb1e.exe -
Drops file in Windows directory 8 IoCs
Processes:
svchost.exeTiWorker.exedescription ioc process File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe File opened for modification C:\Windows\WinSxS\pending.xml TiWorker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
svchost.exeTiWorker.exe0b375c7fdd1f3f4d855c7a80bd3a09f369890cfd2090d277d38cf1f90cc6bb1e.exedescription pid process Token: SeShutdownPrivilege 1852 svchost.exe Token: SeCreatePagefilePrivilege 1852 svchost.exe Token: SeShutdownPrivilege 1852 svchost.exe Token: SeCreatePagefilePrivilege 1852 svchost.exe Token: SeShutdownPrivilege 1852 svchost.exe Token: SeCreatePagefilePrivilege 1852 svchost.exe Token: SeSecurityPrivilege 3948 TiWorker.exe Token: SeRestorePrivilege 3948 TiWorker.exe Token: SeBackupPrivilege 3948 TiWorker.exe Token: SeBackupPrivilege 3948 TiWorker.exe Token: SeRestorePrivilege 3948 TiWorker.exe Token: SeSecurityPrivilege 3948 TiWorker.exe Token: SeBackupPrivilege 3948 TiWorker.exe Token: SeRestorePrivilege 3948 TiWorker.exe Token: SeSecurityPrivilege 3948 TiWorker.exe Token: SeBackupPrivilege 3948 TiWorker.exe Token: SeRestorePrivilege 3948 TiWorker.exe Token: SeSecurityPrivilege 3948 TiWorker.exe Token: SeBackupPrivilege 3948 TiWorker.exe Token: SeRestorePrivilege 3948 TiWorker.exe Token: SeSecurityPrivilege 3948 TiWorker.exe Token: SeBackupPrivilege 3948 TiWorker.exe Token: SeRestorePrivilege 3948 TiWorker.exe Token: SeSecurityPrivilege 3948 TiWorker.exe Token: SeBackupPrivilege 3948 TiWorker.exe Token: SeRestorePrivilege 3948 TiWorker.exe Token: SeSecurityPrivilege 3948 TiWorker.exe Token: SeBackupPrivilege 3948 TiWorker.exe Token: SeRestorePrivilege 3948 TiWorker.exe Token: SeSecurityPrivilege 3948 TiWorker.exe Token: SeBackupPrivilege 3948 TiWorker.exe Token: SeRestorePrivilege 3948 TiWorker.exe Token: SeSecurityPrivilege 3948 TiWorker.exe Token: SeBackupPrivilege 3948 TiWorker.exe Token: SeRestorePrivilege 3948 TiWorker.exe Token: SeSecurityPrivilege 3948 TiWorker.exe Token: SeBackupPrivilege 3948 TiWorker.exe Token: SeRestorePrivilege 3948 TiWorker.exe Token: SeSecurityPrivilege 3948 TiWorker.exe Token: SeIncBasePriorityPrivilege 1276 0b375c7fdd1f3f4d855c7a80bd3a09f369890cfd2090d277d38cf1f90cc6bb1e.exe Token: SeBackupPrivilege 3948 TiWorker.exe Token: SeRestorePrivilege 3948 TiWorker.exe Token: SeSecurityPrivilege 3948 TiWorker.exe Token: SeBackupPrivilege 3948 TiWorker.exe Token: SeRestorePrivilege 3948 TiWorker.exe Token: SeSecurityPrivilege 3948 TiWorker.exe Token: SeBackupPrivilege 3948 TiWorker.exe Token: SeRestorePrivilege 3948 TiWorker.exe Token: SeSecurityPrivilege 3948 TiWorker.exe Token: SeBackupPrivilege 3948 TiWorker.exe Token: SeRestorePrivilege 3948 TiWorker.exe Token: SeSecurityPrivilege 3948 TiWorker.exe Token: SeBackupPrivilege 3948 TiWorker.exe Token: SeRestorePrivilege 3948 TiWorker.exe Token: SeSecurityPrivilege 3948 TiWorker.exe Token: SeBackupPrivilege 3948 TiWorker.exe Token: SeRestorePrivilege 3948 TiWorker.exe Token: SeSecurityPrivilege 3948 TiWorker.exe Token: SeBackupPrivilege 3948 TiWorker.exe Token: SeRestorePrivilege 3948 TiWorker.exe Token: SeSecurityPrivilege 3948 TiWorker.exe Token: SeBackupPrivilege 3948 TiWorker.exe Token: SeRestorePrivilege 3948 TiWorker.exe Token: SeSecurityPrivilege 3948 TiWorker.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
0b375c7fdd1f3f4d855c7a80bd3a09f369890cfd2090d277d38cf1f90cc6bb1e.execmd.exedescription pid process target process PID 1276 wrote to memory of 1984 1276 0b375c7fdd1f3f4d855c7a80bd3a09f369890cfd2090d277d38cf1f90cc6bb1e.exe MediaCenter.exe PID 1276 wrote to memory of 1984 1276 0b375c7fdd1f3f4d855c7a80bd3a09f369890cfd2090d277d38cf1f90cc6bb1e.exe MediaCenter.exe PID 1276 wrote to memory of 1984 1276 0b375c7fdd1f3f4d855c7a80bd3a09f369890cfd2090d277d38cf1f90cc6bb1e.exe MediaCenter.exe PID 1276 wrote to memory of 4376 1276 0b375c7fdd1f3f4d855c7a80bd3a09f369890cfd2090d277d38cf1f90cc6bb1e.exe cmd.exe PID 1276 wrote to memory of 4376 1276 0b375c7fdd1f3f4d855c7a80bd3a09f369890cfd2090d277d38cf1f90cc6bb1e.exe cmd.exe PID 1276 wrote to memory of 4376 1276 0b375c7fdd1f3f4d855c7a80bd3a09f369890cfd2090d277d38cf1f90cc6bb1e.exe cmd.exe PID 4376 wrote to memory of 4532 4376 cmd.exe PING.EXE PID 4376 wrote to memory of 4532 4376 cmd.exe PING.EXE PID 4376 wrote to memory of 4532 4376 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b375c7fdd1f3f4d855c7a80bd3a09f369890cfd2090d277d38cf1f90cc6bb1e.exe"C:\Users\Admin\AppData\Local\Temp\0b375c7fdd1f3f4d855c7a80bd3a09f369890cfd2090d277d38cf1f90cc6bb1e.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:1984 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\0b375c7fdd1f3f4d855c7a80bd3a09f369890cfd2090d277d38cf1f90cc6bb1e.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:4532
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1852
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3948
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeMD5
5461f9f250c3bdd2945676d4bf016417
SHA1340e89a1b2a1699af24ead82662d5058c9ff523f
SHA256645934864b524db7c8c38700cd61032007b82f5376eceddb39af33299cf437aa
SHA51244a5e9b585edd0e30d415fb2a30471160e60e5ca9d95499179aa0a6ed6e0e49751faacfb16f097159a5cdd721d9bd08cc23fb2c221a1f4d8facc932e0b05ea54
-
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeMD5
5461f9f250c3bdd2945676d4bf016417
SHA1340e89a1b2a1699af24ead82662d5058c9ff523f
SHA256645934864b524db7c8c38700cd61032007b82f5376eceddb39af33299cf437aa
SHA51244a5e9b585edd0e30d415fb2a30471160e60e5ca9d95499179aa0a6ed6e0e49751faacfb16f097159a5cdd721d9bd08cc23fb2c221a1f4d8facc932e0b05ea54
-
memory/1852-132-0x0000023535130000-0x0000023535140000-memory.dmpFilesize
64KB
-
memory/1852-133-0x0000023535190000-0x00000235351A0000-memory.dmpFilesize
64KB
-
memory/1852-134-0x0000023537E90000-0x0000023537E94000-memory.dmpFilesize
16KB