Analysis

  • max time kernel
    139s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    12-02-2022 07:31

General

  • Target

    0d5cacb7097f4ae717b2542ead802ade35af8760d59e010e93e349dfa5125213.exe

  • Size

    92KB

  • MD5

    37e36ce6d360ba66714e1a581df200b5

  • SHA1

    0d71d56fb24e46fa378684fe27d9f374d85d2163

  • SHA256

    0d5cacb7097f4ae717b2542ead802ade35af8760d59e010e93e349dfa5125213

  • SHA512

    e3e8bd27f1cc5bcfdcba8e3098c4d05b850876b3ca5326b9ac1c91ba414f48025d0742426481adc3b10fe28039d23454a5393a0fd31d295588e107c02dd97935

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Sakula Payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0d5cacb7097f4ae717b2542ead802ade35af8760d59e010e93e349dfa5125213.exe
    "C:\Users\Admin\AppData\Local\Temp\0d5cacb7097f4ae717b2542ead802ade35af8760d59e010e93e349dfa5125213.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2588
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:1708
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\0d5cacb7097f4ae717b2542ead802ade35af8760d59e010e93e349dfa5125213.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:624
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:2384
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:3676
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:4272

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    35956cb6e375e9d63878f84375cf1f49

    SHA1

    3a09c07e56e00ec93d6c07ef524af36dc65e4472

    SHA256

    74494a7376cc110655737265ea12ba23652adb30a349f4e5e3179733627c0482

    SHA512

    7244746a40c2a3a7a4824818b68cec033764196437cef004f2dab77185e9c54f73960d82d7e0546e9eff75cabb5073151d358993074fa69d0645d60e8c054736

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    35956cb6e375e9d63878f84375cf1f49

    SHA1

    3a09c07e56e00ec93d6c07ef524af36dc65e4472

    SHA256

    74494a7376cc110655737265ea12ba23652adb30a349f4e5e3179733627c0482

    SHA512

    7244746a40c2a3a7a4824818b68cec033764196437cef004f2dab77185e9c54f73960d82d7e0546e9eff75cabb5073151d358993074fa69d0645d60e8c054736

  • memory/3676-133-0x00000263A0C80000-0x00000263A0C90000-memory.dmp

    Filesize

    64KB

  • memory/3676-132-0x00000263A0C20000-0x00000263A0C30000-memory.dmp

    Filesize

    64KB

  • memory/3676-134-0x00000263A3340000-0x00000263A3344000-memory.dmp

    Filesize

    16KB