Analysis

  • max time kernel
    171s
  • max time network
    186s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    12-02-2022 07:53

General

  • Target

    0c6912995f6fdbd78fb7ad70a3c642c195e4391f75295e32e1fc0916b4e7fc44.exe

  • Size

    92KB

  • MD5

    cb6e65e37366e138f8b5087cb756eaa6

  • SHA1

    4544ba23005f87c87579bee692ba0432386b1465

  • SHA256

    0c6912995f6fdbd78fb7ad70a3c642c195e4391f75295e32e1fc0916b4e7fc44

  • SHA512

    08045a87c996948885d0684233fdc4834dcf3ac43da8f9aeddf2d2eb5b729a07893646663d5e3b3a206a3852dd06cf9bb8b16a775f41030441c483a15775554a

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Sakula Payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 49 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0c6912995f6fdbd78fb7ad70a3c642c195e4391f75295e32e1fc0916b4e7fc44.exe
    "C:\Users\Admin\AppData\Local\Temp\0c6912995f6fdbd78fb7ad70a3c642c195e4391f75295e32e1fc0916b4e7fc44.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3704
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:2604
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\0c6912995f6fdbd78fb7ad70a3c642c195e4391f75295e32e1fc0916b4e7fc44.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2316
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:3036
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k NetworkService -p
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    PID:4064
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2940

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    4b0acf503bc4ab34e4585f512da1b67c

    SHA1

    2cdfae094f2487c75de6873d873b56d83b3352ac

    SHA256

    d17f8aeaa3c68bfe3859839bfcedcdc5b74b513756fd7ff821d42295466e2e70

    SHA512

    1d6680841e22030ff2a5277d7a0a7b67182ec55787b90ed417a41b0022641a81c00ff9ebc7b7e2a14995e6677c92e3f2a595d5f67372b14d2c5217d0a6efe863

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    4b0acf503bc4ab34e4585f512da1b67c

    SHA1

    2cdfae094f2487c75de6873d873b56d83b3352ac

    SHA256

    d17f8aeaa3c68bfe3859839bfcedcdc5b74b513756fd7ff821d42295466e2e70

    SHA512

    1d6680841e22030ff2a5277d7a0a7b67182ec55787b90ed417a41b0022641a81c00ff9ebc7b7e2a14995e6677c92e3f2a595d5f67372b14d2c5217d0a6efe863