Analysis

  • max time kernel
    149s
  • max time network
    179s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    12-02-2022 08:00

General

  • Target

    0c00e6751b674fd87b4795f287a1d3a426efb848c34d46112661b1a04e899a5a.exe

  • Size

    192KB

  • MD5

    cd9ade9e3b0a2a7548840f32740f1db3

  • SHA1

    74f1caddda2712f57783ba20f6f883780922225c

  • SHA256

    0c00e6751b674fd87b4795f287a1d3a426efb848c34d46112661b1a04e899a5a

  • SHA512

    ae323bf64536605ce4ff0b50d096b7c492640e202832757fa1d029551e496a3b03e484e26c611fd3ca1d69008166846621a5abda47de9615db71502281628fe4

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Sakula Payload 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0c00e6751b674fd87b4795f287a1d3a426efb848c34d46112661b1a04e899a5a.exe
    "C:\Users\Admin\AppData\Local\Temp\0c00e6751b674fd87b4795f287a1d3a426efb848c34d46112661b1a04e899a5a.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1672
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:1600
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\0c00e6751b674fd87b4795f287a1d3a426efb848c34d46112661b1a04e899a5a.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:944
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:948

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    43e53718a33beda4e7bd20b28f54642d

    SHA1

    f095051a89b46e598862cf4d35edf73da88bb3e1

    SHA256

    ccc653fd3a2935b354d7d0b745eec186f6e4f73f970e9b25d94d8627fa1c3fda

    SHA512

    195cf6bc6c5b2555e2765c8daff240e2f4473a9fb3178c9cd0c73ffd95604069cd6194fc99550ea9e19975cffc05bc60e3369886e1d3083feaddc7930e5ed2c4

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    43e53718a33beda4e7bd20b28f54642d

    SHA1

    f095051a89b46e598862cf4d35edf73da88bb3e1

    SHA256

    ccc653fd3a2935b354d7d0b745eec186f6e4f73f970e9b25d94d8627fa1c3fda

    SHA512

    195cf6bc6c5b2555e2765c8daff240e2f4473a9fb3178c9cd0c73ffd95604069cd6194fc99550ea9e19975cffc05bc60e3369886e1d3083feaddc7930e5ed2c4

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    43e53718a33beda4e7bd20b28f54642d

    SHA1

    f095051a89b46e598862cf4d35edf73da88bb3e1

    SHA256

    ccc653fd3a2935b354d7d0b745eec186f6e4f73f970e9b25d94d8627fa1c3fda

    SHA512

    195cf6bc6c5b2555e2765c8daff240e2f4473a9fb3178c9cd0c73ffd95604069cd6194fc99550ea9e19975cffc05bc60e3369886e1d3083feaddc7930e5ed2c4

  • memory/1672-55-0x0000000075801000-0x0000000075803000-memory.dmp

    Filesize

    8KB