Analysis
-
max time kernel
167s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
12-02-2022 07:39
Static task
static1
Behavioral task
behavioral1
Sample
0d02af89f980d2126637a275950193cd70c1cbbe3f51de096142a37c002330f7.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
0d02af89f980d2126637a275950193cd70c1cbbe3f51de096142a37c002330f7.exe
Resource
win10v2004-en-20220112
General
-
Target
0d02af89f980d2126637a275950193cd70c1cbbe3f51de096142a37c002330f7.exe
-
Size
150KB
-
MD5
81668b5542ac253625bea6e7a195a6db
-
SHA1
f2c0dd805f567c05d80280a8a5c48a3843d5bfb1
-
SHA256
0d02af89f980d2126637a275950193cd70c1cbbe3f51de096142a37c002330f7
-
SHA512
a5c9c45e1e31155aeaac5fb63500867bca9edacd6a126c22f14b4c79fe22a6d7acf0625e60d18ca8e313c32db8968c6c429f6dd798ef3e8e5edca3100fb8fb3a
Malware Config
Signatures
-
Sakula Payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula -
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 2192 MediaCenter.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
0d02af89f980d2126637a275950193cd70c1cbbe3f51de096142a37c002330f7.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation 0d02af89f980d2126637a275950193cd70c1cbbe3f51de096142a37c002330f7.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
0d02af89f980d2126637a275950193cd70c1cbbe3f51de096142a37c002330f7.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 0d02af89f980d2126637a275950193cd70c1cbbe3f51de096142a37c002330f7.exe -
Drops file in Windows directory 3 IoCs
Processes:
svchost.exeTiWorker.exedescription ioc process File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\DeliveryOptimization\State\keyValueLKG.dat svchost.exe File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe File opened for modification C:\Windows\WinSxS\pending.xml TiWorker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 49 IoCs
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCdnBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\SwarmCount = "0" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCacheHostBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateFrBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\LinkLocalConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownlinkUsageBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UplinkUsageBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\DownloadMode_BackCompat = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadMonthlyLanBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\SwarmCount = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\InternetConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownlinkBps = "0" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Settings svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyInternetBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UplinkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\NormalDownloadPendingCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\LANConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\FrDownloadRatePct = "90" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyLinkLocalBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkBps = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\Geo_EndpointFullUri = "https://geo.prod.do.dsp.mp.microsoft.com/geo" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\GeoVersion_EndpointFullUri = "https://geover.prod.do.dsp.mp.microsoft.com/geoversion" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CacheSizeBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PeerInfoCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CDNConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\GroupConnectionCount = "0" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\DODownloadMode = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyLanBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyGroupBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateFrCnt = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\BkDownloadRatePct = "45" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadRatePct = "100" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\NormalDownloadCount = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "5.555342" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "0.075188" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PriorityDownloadCount = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "0.043630" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadMonthlyInternetBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthID = "2" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\KVFileExpirationTime = "132893019275896605" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthlyUploadRestriction = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkCnt = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PriorityDownloadPendingCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "4080" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "4296" svchost.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
0d02af89f980d2126637a275950193cd70c1cbbe3f51de096142a37c002330f7.exeTiWorker.exedescription pid process Token: SeIncBasePriorityPrivilege 2940 0d02af89f980d2126637a275950193cd70c1cbbe3f51de096142a37c002330f7.exe Token: SeSecurityPrivilege 400 TiWorker.exe Token: SeRestorePrivilege 400 TiWorker.exe Token: SeBackupPrivilege 400 TiWorker.exe Token: SeBackupPrivilege 400 TiWorker.exe Token: SeRestorePrivilege 400 TiWorker.exe Token: SeSecurityPrivilege 400 TiWorker.exe Token: SeBackupPrivilege 400 TiWorker.exe Token: SeRestorePrivilege 400 TiWorker.exe Token: SeSecurityPrivilege 400 TiWorker.exe Token: SeBackupPrivilege 400 TiWorker.exe Token: SeRestorePrivilege 400 TiWorker.exe Token: SeSecurityPrivilege 400 TiWorker.exe Token: SeBackupPrivilege 400 TiWorker.exe Token: SeRestorePrivilege 400 TiWorker.exe Token: SeSecurityPrivilege 400 TiWorker.exe Token: SeBackupPrivilege 400 TiWorker.exe Token: SeRestorePrivilege 400 TiWorker.exe Token: SeSecurityPrivilege 400 TiWorker.exe Token: SeBackupPrivilege 400 TiWorker.exe Token: SeRestorePrivilege 400 TiWorker.exe Token: SeSecurityPrivilege 400 TiWorker.exe Token: SeBackupPrivilege 400 TiWorker.exe Token: SeRestorePrivilege 400 TiWorker.exe Token: SeSecurityPrivilege 400 TiWorker.exe Token: SeBackupPrivilege 400 TiWorker.exe Token: SeRestorePrivilege 400 TiWorker.exe Token: SeSecurityPrivilege 400 TiWorker.exe Token: SeBackupPrivilege 400 TiWorker.exe Token: SeRestorePrivilege 400 TiWorker.exe Token: SeSecurityPrivilege 400 TiWorker.exe Token: SeBackupPrivilege 400 TiWorker.exe Token: SeRestorePrivilege 400 TiWorker.exe Token: SeSecurityPrivilege 400 TiWorker.exe Token: SeBackupPrivilege 400 TiWorker.exe Token: SeRestorePrivilege 400 TiWorker.exe Token: SeSecurityPrivilege 400 TiWorker.exe Token: SeBackupPrivilege 400 TiWorker.exe Token: SeRestorePrivilege 400 TiWorker.exe Token: SeSecurityPrivilege 400 TiWorker.exe Token: SeBackupPrivilege 400 TiWorker.exe Token: SeRestorePrivilege 400 TiWorker.exe Token: SeSecurityPrivilege 400 TiWorker.exe Token: SeBackupPrivilege 400 TiWorker.exe Token: SeRestorePrivilege 400 TiWorker.exe Token: SeSecurityPrivilege 400 TiWorker.exe Token: SeBackupPrivilege 400 TiWorker.exe Token: SeRestorePrivilege 400 TiWorker.exe Token: SeSecurityPrivilege 400 TiWorker.exe Token: SeBackupPrivilege 400 TiWorker.exe Token: SeRestorePrivilege 400 TiWorker.exe Token: SeSecurityPrivilege 400 TiWorker.exe Token: SeBackupPrivilege 400 TiWorker.exe Token: SeRestorePrivilege 400 TiWorker.exe Token: SeSecurityPrivilege 400 TiWorker.exe Token: SeBackupPrivilege 400 TiWorker.exe Token: SeRestorePrivilege 400 TiWorker.exe Token: SeSecurityPrivilege 400 TiWorker.exe Token: SeBackupPrivilege 400 TiWorker.exe Token: SeRestorePrivilege 400 TiWorker.exe Token: SeSecurityPrivilege 400 TiWorker.exe Token: SeBackupPrivilege 400 TiWorker.exe Token: SeRestorePrivilege 400 TiWorker.exe Token: SeSecurityPrivilege 400 TiWorker.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
0d02af89f980d2126637a275950193cd70c1cbbe3f51de096142a37c002330f7.execmd.exedescription pid process target process PID 2940 wrote to memory of 2192 2940 0d02af89f980d2126637a275950193cd70c1cbbe3f51de096142a37c002330f7.exe MediaCenter.exe PID 2940 wrote to memory of 2192 2940 0d02af89f980d2126637a275950193cd70c1cbbe3f51de096142a37c002330f7.exe MediaCenter.exe PID 2940 wrote to memory of 2192 2940 0d02af89f980d2126637a275950193cd70c1cbbe3f51de096142a37c002330f7.exe MediaCenter.exe PID 2940 wrote to memory of 3840 2940 0d02af89f980d2126637a275950193cd70c1cbbe3f51de096142a37c002330f7.exe cmd.exe PID 2940 wrote to memory of 3840 2940 0d02af89f980d2126637a275950193cd70c1cbbe3f51de096142a37c002330f7.exe cmd.exe PID 2940 wrote to memory of 3840 2940 0d02af89f980d2126637a275950193cd70c1cbbe3f51de096142a37c002330f7.exe cmd.exe PID 3840 wrote to memory of 3460 3840 cmd.exe PING.EXE PID 3840 wrote to memory of 3460 3840 cmd.exe PING.EXE PID 3840 wrote to memory of 3460 3840 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d02af89f980d2126637a275950193cd70c1cbbe3f51de096142a37c002330f7.exe"C:\Users\Admin\AppData\Local\Temp\0d02af89f980d2126637a275950193cd70c1cbbe3f51de096142a37c002330f7.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:2192 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\0d02af89f980d2126637a275950193cd70c1cbbe3f51de096142a37c002330f7.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:3460
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:2360
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:400
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
af4a72c79eb53d3cdfe6e0514e6913c3
SHA1f6c8aff62ada84147e607890f551fe3a1a45ace2
SHA2560e241d2766668082784fc93a2f82399b0c415fa284a504e81eb7ceab96e9c76e
SHA512a00ce8aff9db9590804a683d5eab2edffc87a140222b3578e0cffefdeccb2b3bc0113d43cc75716448edf50f3f9cbe9d6fe5b6bb4b10512e7f5650a4cbf2826b
-
MD5
af4a72c79eb53d3cdfe6e0514e6913c3
SHA1f6c8aff62ada84147e607890f551fe3a1a45ace2
SHA2560e241d2766668082784fc93a2f82399b0c415fa284a504e81eb7ceab96e9c76e
SHA512a00ce8aff9db9590804a683d5eab2edffc87a140222b3578e0cffefdeccb2b3bc0113d43cc75716448edf50f3f9cbe9d6fe5b6bb4b10512e7f5650a4cbf2826b