Analysis

  • max time kernel
    140s
  • max time network
    165s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    12-02-2022 07:58

General

  • Target

    0c104e13c4f9b290951d0f189e7e8767523e09b29cee59165326af25d64d2c22.exe

  • Size

    35KB

  • MD5

    177c1fe091d873b91d104d973de8ed99

  • SHA1

    7b009545d6cd0851fde4495ed8e2df60325379ac

  • SHA256

    0c104e13c4f9b290951d0f189e7e8767523e09b29cee59165326af25d64d2c22

  • SHA512

    8037fe64d2ea24c6514041c1e714bb7ce79b432643507223de4157f7995708515f7c1913a5261a12bedfc0644b18dcaf22aa3b8a5b0425dd4b51587a80db48c1

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0c104e13c4f9b290951d0f189e7e8767523e09b29cee59165326af25d64d2c22.exe
    "C:\Users\Admin\AppData\Local\Temp\0c104e13c4f9b290951d0f189e7e8767523e09b29cee59165326af25d64d2c22.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3840
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:1992
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\0c104e13c4f9b290951d0f189e7e8767523e09b29cee59165326af25d64d2c22.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4988
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:3508
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:3404
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:1776

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    7d075786b4df5a1028484ba211cea1e7

    SHA1

    9adc4550555c7b55af60bb40bd58acfd4588f84d

    SHA256

    39519e383b37128694191896f9a0999e69dd7d0c4e4f71c2675e00c385cc04e8

    SHA512

    e0ffe857293627af8d56d12fc6ecaddc1a7f3c1519b788a19966d08dfd5c1357b1f245038456e69c29005f3304d2d583e556f1b8be873b9ae3006c93b143deeb

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    7d075786b4df5a1028484ba211cea1e7

    SHA1

    9adc4550555c7b55af60bb40bd58acfd4588f84d

    SHA256

    39519e383b37128694191896f9a0999e69dd7d0c4e4f71c2675e00c385cc04e8

    SHA512

    e0ffe857293627af8d56d12fc6ecaddc1a7f3c1519b788a19966d08dfd5c1357b1f245038456e69c29005f3304d2d583e556f1b8be873b9ae3006c93b143deeb

  • memory/3404-132-0x000002014BF30000-0x000002014BF7B000-memory.dmp

    Filesize

    300KB

  • memory/3404-136-0x000002014BF70000-0x000002014BF80000-memory.dmp

    Filesize

    64KB

  • memory/3404-137-0x000002014BF90000-0x000002014BFA0000-memory.dmp

    Filesize

    64KB

  • memory/3404-138-0x000002014ECA0000-0x000002014ECA4000-memory.dmp

    Filesize

    16KB