Analysis

  • max time kernel
    164s
  • max time network
    176s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    12-02-2022 08:01

General

  • Target

    0be534a912b302ee0e1051c758b5de9dabb0ee29ff2fd133ad34cec9e1ba6510.exe

  • Size

    35KB

  • MD5

    8817baea6ce000f262b717d5ef1932e5

  • SHA1

    21ecb146ec0be79920e1cd148b6a2b9b6929d089

  • SHA256

    0be534a912b302ee0e1051c758b5de9dabb0ee29ff2fd133ad34cec9e1ba6510

  • SHA512

    c02574cc6e7a5106d0742e8496e3662bb3af4366462eddc13aef50687bea6d3b36aae9c2d945aac5ae5f7cce90eb01a4a19281fb4ae9bb78e772b78ac94d3343

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 50 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0be534a912b302ee0e1051c758b5de9dabb0ee29ff2fd133ad34cec9e1ba6510.exe
    "C:\Users\Admin\AppData\Local\Temp\0be534a912b302ee0e1051c758b5de9dabb0ee29ff2fd133ad34cec9e1ba6510.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1992
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:3800
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\0be534a912b302ee0e1051c758b5de9dabb0ee29ff2fd133ad34cec9e1ba6510.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3776
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:1908
  • C:\Windows\system32\MusNotifyIcon.exe
    %systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 0
    1⤵
    • Checks processor information in registry
    PID:844
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k NetworkService -p
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    PID:3552
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
      PID:2884

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

      MD5

      5174fa9e5646e7f511d10dd67aad79f1

      SHA1

      3bbef740324fccfcd46dbd336e58c1eae884b6a1

      SHA256

      b2fb9f242ef3fca66c5ac205c0c1280768cf8c1e142a9588449c480e41b85eab

      SHA512

      45b2c6962bfcf138cf969946778e6d43fabbc740d8c751ad107001142a24dce41ba5ff1ceab3e38f12a8e5dc8f2be2539e91d5971a84d7645a0d878c6c6177a0

    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

      MD5

      5174fa9e5646e7f511d10dd67aad79f1

      SHA1

      3bbef740324fccfcd46dbd336e58c1eae884b6a1

      SHA256

      b2fb9f242ef3fca66c5ac205c0c1280768cf8c1e142a9588449c480e41b85eab

      SHA512

      45b2c6962bfcf138cf969946778e6d43fabbc740d8c751ad107001142a24dce41ba5ff1ceab3e38f12a8e5dc8f2be2539e91d5971a84d7645a0d878c6c6177a0