Analysis
-
max time kernel
146s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
12-02-2022 07:58
Static task
static1
Behavioral task
behavioral1
Sample
0c13dc2bd847136c92d8d09751cc68b01f5e80ea7d0b9888e04880efd5eb8efa.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
0c13dc2bd847136c92d8d09751cc68b01f5e80ea7d0b9888e04880efd5eb8efa.exe
Resource
win10v2004-en-20220113
General
-
Target
0c13dc2bd847136c92d8d09751cc68b01f5e80ea7d0b9888e04880efd5eb8efa.exe
-
Size
80KB
-
MD5
af38d930b069f2ecef817d8fca7dc29f
-
SHA1
cc76ae2456a47d8307012295b4cfa056eafeb17a
-
SHA256
0c13dc2bd847136c92d8d09751cc68b01f5e80ea7d0b9888e04880efd5eb8efa
-
SHA512
61caeea9efa1f61a33b2c7b987dae1e80721b0f9f8bee1a6254bc99d163605910ad61cd430c86cff15308e298abfc22a53d441e60e8438f36116c3eafb4ba4c9
Malware Config
Signatures
-
Sakula Payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula -
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 4056 MediaCenter.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
0c13dc2bd847136c92d8d09751cc68b01f5e80ea7d0b9888e04880efd5eb8efa.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 0c13dc2bd847136c92d8d09751cc68b01f5e80ea7d0b9888e04880efd5eb8efa.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
0c13dc2bd847136c92d8d09751cc68b01f5e80ea7d0b9888e04880efd5eb8efa.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 0c13dc2bd847136c92d8d09751cc68b01f5e80ea7d0b9888e04880efd5eb8efa.exe -
Drops file in Windows directory 8 IoCs
Processes:
TiWorker.exesvchost.exedescription ioc process File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe File opened for modification C:\Windows\WinSxS\pending.xml TiWorker.exe File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
svchost.exe0c13dc2bd847136c92d8d09751cc68b01f5e80ea7d0b9888e04880efd5eb8efa.exeTiWorker.exedescription pid process Token: SeShutdownPrivilege 3804 svchost.exe Token: SeCreatePagefilePrivilege 3804 svchost.exe Token: SeShutdownPrivilege 3804 svchost.exe Token: SeCreatePagefilePrivilege 3804 svchost.exe Token: SeShutdownPrivilege 3804 svchost.exe Token: SeCreatePagefilePrivilege 3804 svchost.exe Token: SeIncBasePriorityPrivilege 3644 0c13dc2bd847136c92d8d09751cc68b01f5e80ea7d0b9888e04880efd5eb8efa.exe Token: SeSecurityPrivilege 668 TiWorker.exe Token: SeRestorePrivilege 668 TiWorker.exe Token: SeBackupPrivilege 668 TiWorker.exe Token: SeBackupPrivilege 668 TiWorker.exe Token: SeRestorePrivilege 668 TiWorker.exe Token: SeSecurityPrivilege 668 TiWorker.exe Token: SeBackupPrivilege 668 TiWorker.exe Token: SeRestorePrivilege 668 TiWorker.exe Token: SeSecurityPrivilege 668 TiWorker.exe Token: SeBackupPrivilege 668 TiWorker.exe Token: SeRestorePrivilege 668 TiWorker.exe Token: SeSecurityPrivilege 668 TiWorker.exe Token: SeBackupPrivilege 668 TiWorker.exe Token: SeRestorePrivilege 668 TiWorker.exe Token: SeSecurityPrivilege 668 TiWorker.exe Token: SeBackupPrivilege 668 TiWorker.exe Token: SeRestorePrivilege 668 TiWorker.exe Token: SeSecurityPrivilege 668 TiWorker.exe Token: SeBackupPrivilege 668 TiWorker.exe Token: SeRestorePrivilege 668 TiWorker.exe Token: SeSecurityPrivilege 668 TiWorker.exe Token: SeBackupPrivilege 668 TiWorker.exe Token: SeRestorePrivilege 668 TiWorker.exe Token: SeSecurityPrivilege 668 TiWorker.exe Token: SeBackupPrivilege 668 TiWorker.exe Token: SeRestorePrivilege 668 TiWorker.exe Token: SeSecurityPrivilege 668 TiWorker.exe Token: SeBackupPrivilege 668 TiWorker.exe Token: SeRestorePrivilege 668 TiWorker.exe Token: SeSecurityPrivilege 668 TiWorker.exe Token: SeBackupPrivilege 668 TiWorker.exe Token: SeRestorePrivilege 668 TiWorker.exe Token: SeSecurityPrivilege 668 TiWorker.exe Token: SeBackupPrivilege 668 TiWorker.exe Token: SeRestorePrivilege 668 TiWorker.exe Token: SeSecurityPrivilege 668 TiWorker.exe Token: SeBackupPrivilege 668 TiWorker.exe Token: SeRestorePrivilege 668 TiWorker.exe Token: SeSecurityPrivilege 668 TiWorker.exe Token: SeBackupPrivilege 668 TiWorker.exe Token: SeRestorePrivilege 668 TiWorker.exe Token: SeSecurityPrivilege 668 TiWorker.exe Token: SeBackupPrivilege 668 TiWorker.exe Token: SeRestorePrivilege 668 TiWorker.exe Token: SeSecurityPrivilege 668 TiWorker.exe Token: SeBackupPrivilege 668 TiWorker.exe Token: SeRestorePrivilege 668 TiWorker.exe Token: SeSecurityPrivilege 668 TiWorker.exe Token: SeBackupPrivilege 668 TiWorker.exe Token: SeRestorePrivilege 668 TiWorker.exe Token: SeSecurityPrivilege 668 TiWorker.exe Token: SeBackupPrivilege 668 TiWorker.exe Token: SeRestorePrivilege 668 TiWorker.exe Token: SeSecurityPrivilege 668 TiWorker.exe Token: SeBackupPrivilege 668 TiWorker.exe Token: SeRestorePrivilege 668 TiWorker.exe Token: SeSecurityPrivilege 668 TiWorker.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
0c13dc2bd847136c92d8d09751cc68b01f5e80ea7d0b9888e04880efd5eb8efa.execmd.exedescription pid process target process PID 3644 wrote to memory of 4056 3644 0c13dc2bd847136c92d8d09751cc68b01f5e80ea7d0b9888e04880efd5eb8efa.exe MediaCenter.exe PID 3644 wrote to memory of 4056 3644 0c13dc2bd847136c92d8d09751cc68b01f5e80ea7d0b9888e04880efd5eb8efa.exe MediaCenter.exe PID 3644 wrote to memory of 4056 3644 0c13dc2bd847136c92d8d09751cc68b01f5e80ea7d0b9888e04880efd5eb8efa.exe MediaCenter.exe PID 3644 wrote to memory of 2220 3644 0c13dc2bd847136c92d8d09751cc68b01f5e80ea7d0b9888e04880efd5eb8efa.exe cmd.exe PID 3644 wrote to memory of 2220 3644 0c13dc2bd847136c92d8d09751cc68b01f5e80ea7d0b9888e04880efd5eb8efa.exe cmd.exe PID 3644 wrote to memory of 2220 3644 0c13dc2bd847136c92d8d09751cc68b01f5e80ea7d0b9888e04880efd5eb8efa.exe cmd.exe PID 2220 wrote to memory of 3436 2220 cmd.exe PING.EXE PID 2220 wrote to memory of 3436 2220 cmd.exe PING.EXE PID 2220 wrote to memory of 3436 2220 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c13dc2bd847136c92d8d09751cc68b01f5e80ea7d0b9888e04880efd5eb8efa.exe"C:\Users\Admin\AppData\Local\Temp\0c13dc2bd847136c92d8d09751cc68b01f5e80ea7d0b9888e04880efd5eb8efa.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:4056 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\0c13dc2bd847136c92d8d09751cc68b01f5e80ea7d0b9888e04880efd5eb8efa.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:3436
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3804
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:668
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
56000887c59976843d808511be3f5af9
SHA11c73f04f1622f17485932f8a37a2369c8eb49e7e
SHA256eea2c822c224b443d86bfa63f942b6b43f74f470a3c412135f8a304f58785096
SHA51220ed29d196c82bd7e71b09e19428ef0192b5507e967106299909ad12aa4a1c46a6784ba1616d057e4baaa208d7fa446d9c40490a48c1951b42d233a94ad5e129
-
MD5
56000887c59976843d808511be3f5af9
SHA11c73f04f1622f17485932f8a37a2369c8eb49e7e
SHA256eea2c822c224b443d86bfa63f942b6b43f74f470a3c412135f8a304f58785096
SHA51220ed29d196c82bd7e71b09e19428ef0192b5507e967106299909ad12aa4a1c46a6784ba1616d057e4baaa208d7fa446d9c40490a48c1951b42d233a94ad5e129