Analysis
-
max time kernel
161s -
max time network
179s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
12-02-2022 07:58
Static task
static1
Behavioral task
behavioral1
Sample
0c13dc2bd847136c92d8d09751cc68b01f5e80ea7d0b9888e04880efd5eb8efa.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
0c13dc2bd847136c92d8d09751cc68b01f5e80ea7d0b9888e04880efd5eb8efa.exe
Resource
win10v2004-en-20220113
General
-
Target
0c13dc2bd847136c92d8d09751cc68b01f5e80ea7d0b9888e04880efd5eb8efa.exe
-
Size
80KB
-
MD5
af38d930b069f2ecef817d8fca7dc29f
-
SHA1
cc76ae2456a47d8307012295b4cfa056eafeb17a
-
SHA256
0c13dc2bd847136c92d8d09751cc68b01f5e80ea7d0b9888e04880efd5eb8efa
-
SHA512
61caeea9efa1f61a33b2c7b987dae1e80721b0f9f8bee1a6254bc99d163605910ad61cd430c86cff15308e298abfc22a53d441e60e8438f36116c3eafb4ba4c9
Malware Config
Signatures
-
Sakula Payload 3 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula -
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 828 MediaCenter.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 432 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
0c13dc2bd847136c92d8d09751cc68b01f5e80ea7d0b9888e04880efd5eb8efa.exepid process 1664 0c13dc2bd847136c92d8d09751cc68b01f5e80ea7d0b9888e04880efd5eb8efa.exe 1664 0c13dc2bd847136c92d8d09751cc68b01f5e80ea7d0b9888e04880efd5eb8efa.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
0c13dc2bd847136c92d8d09751cc68b01f5e80ea7d0b9888e04880efd5eb8efa.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 0c13dc2bd847136c92d8d09751cc68b01f5e80ea7d0b9888e04880efd5eb8efa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
0c13dc2bd847136c92d8d09751cc68b01f5e80ea7d0b9888e04880efd5eb8efa.exedescription pid process Token: SeIncBasePriorityPrivilege 1664 0c13dc2bd847136c92d8d09751cc68b01f5e80ea7d0b9888e04880efd5eb8efa.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
0c13dc2bd847136c92d8d09751cc68b01f5e80ea7d0b9888e04880efd5eb8efa.execmd.exedescription pid process target process PID 1664 wrote to memory of 828 1664 0c13dc2bd847136c92d8d09751cc68b01f5e80ea7d0b9888e04880efd5eb8efa.exe MediaCenter.exe PID 1664 wrote to memory of 828 1664 0c13dc2bd847136c92d8d09751cc68b01f5e80ea7d0b9888e04880efd5eb8efa.exe MediaCenter.exe PID 1664 wrote to memory of 828 1664 0c13dc2bd847136c92d8d09751cc68b01f5e80ea7d0b9888e04880efd5eb8efa.exe MediaCenter.exe PID 1664 wrote to memory of 828 1664 0c13dc2bd847136c92d8d09751cc68b01f5e80ea7d0b9888e04880efd5eb8efa.exe MediaCenter.exe PID 1664 wrote to memory of 432 1664 0c13dc2bd847136c92d8d09751cc68b01f5e80ea7d0b9888e04880efd5eb8efa.exe cmd.exe PID 1664 wrote to memory of 432 1664 0c13dc2bd847136c92d8d09751cc68b01f5e80ea7d0b9888e04880efd5eb8efa.exe cmd.exe PID 1664 wrote to memory of 432 1664 0c13dc2bd847136c92d8d09751cc68b01f5e80ea7d0b9888e04880efd5eb8efa.exe cmd.exe PID 1664 wrote to memory of 432 1664 0c13dc2bd847136c92d8d09751cc68b01f5e80ea7d0b9888e04880efd5eb8efa.exe cmd.exe PID 432 wrote to memory of 1260 432 cmd.exe PING.EXE PID 432 wrote to memory of 1260 432 cmd.exe PING.EXE PID 432 wrote to memory of 1260 432 cmd.exe PING.EXE PID 432 wrote to memory of 1260 432 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c13dc2bd847136c92d8d09751cc68b01f5e80ea7d0b9888e04880efd5eb8efa.exe"C:\Users\Admin\AppData\Local\Temp\0c13dc2bd847136c92d8d09751cc68b01f5e80ea7d0b9888e04880efd5eb8efa.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:828 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\0c13dc2bd847136c92d8d09751cc68b01f5e80ea7d0b9888e04880efd5eb8efa.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1260
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
ef3dcd9530c09d5e5b549d8c1ede7703
SHA1c8d012bf2539dcd38270a4036876eb2b9ded38d0
SHA256d996922413112e6940be79ebb32e55efefe6877623293e94e826f020eb7c685c
SHA51228e134f8dc6be8acb56636325bd4459b7f9695e140b29d09b560ce0300c952ce0f091295c5bf1c47fefe5c7699f54c3ecff98719b2bc1d347130de25207c990f
-
MD5
ef3dcd9530c09d5e5b549d8c1ede7703
SHA1c8d012bf2539dcd38270a4036876eb2b9ded38d0
SHA256d996922413112e6940be79ebb32e55efefe6877623293e94e826f020eb7c685c
SHA51228e134f8dc6be8acb56636325bd4459b7f9695e140b29d09b560ce0300c952ce0f091295c5bf1c47fefe5c7699f54c3ecff98719b2bc1d347130de25207c990f
-
MD5
ef3dcd9530c09d5e5b549d8c1ede7703
SHA1c8d012bf2539dcd38270a4036876eb2b9ded38d0
SHA256d996922413112e6940be79ebb32e55efefe6877623293e94e826f020eb7c685c
SHA51228e134f8dc6be8acb56636325bd4459b7f9695e140b29d09b560ce0300c952ce0f091295c5bf1c47fefe5c7699f54c3ecff98719b2bc1d347130de25207c990f