Analysis
-
max time kernel
161s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
12-02-2022 08:04
Static task
static1
Behavioral task
behavioral1
Sample
0bbdc10d88d7c515c2f93bff4b8607f3029ab6ef0efd8c8022e9d58458d9b6a5.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
0bbdc10d88d7c515c2f93bff4b8607f3029ab6ef0efd8c8022e9d58458d9b6a5.exe
Resource
win10v2004-en-20220113
General
-
Target
0bbdc10d88d7c515c2f93bff4b8607f3029ab6ef0efd8c8022e9d58458d9b6a5.exe
-
Size
80KB
-
MD5
26935e64a48ff0c22f51ffb1f7843d54
-
SHA1
86b27bc0f97143a0fa64d1f31bf6a33db1edf131
-
SHA256
0bbdc10d88d7c515c2f93bff4b8607f3029ab6ef0efd8c8022e9d58458d9b6a5
-
SHA512
159529a04627f8601d2415f53995a7137b6e3134a9f6208c0937109e542d96b91dfb8946cd45bf03583a0ccf3bfa3c783b5dc83fbe95816c8ba817f130541efc
Malware Config
Signatures
-
Sakula Payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula -
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 1412 MediaCenter.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
0bbdc10d88d7c515c2f93bff4b8607f3029ab6ef0efd8c8022e9d58458d9b6a5.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 0bbdc10d88d7c515c2f93bff4b8607f3029ab6ef0efd8c8022e9d58458d9b6a5.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
0bbdc10d88d7c515c2f93bff4b8607f3029ab6ef0efd8c8022e9d58458d9b6a5.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 0bbdc10d88d7c515c2f93bff4b8607f3029ab6ef0efd8c8022e9d58458d9b6a5.exe -
Drops file in Windows directory 8 IoCs
Processes:
svchost.exeTiWorker.exedescription ioc process File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe File opened for modification C:\Windows\WinSxS\pending.xml TiWorker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
0bbdc10d88d7c515c2f93bff4b8607f3029ab6ef0efd8c8022e9d58458d9b6a5.exesvchost.exeTiWorker.exedescription pid process Token: SeIncBasePriorityPrivilege 644 0bbdc10d88d7c515c2f93bff4b8607f3029ab6ef0efd8c8022e9d58458d9b6a5.exe Token: SeShutdownPrivilege 208 svchost.exe Token: SeCreatePagefilePrivilege 208 svchost.exe Token: SeShutdownPrivilege 208 svchost.exe Token: SeCreatePagefilePrivilege 208 svchost.exe Token: SeShutdownPrivilege 208 svchost.exe Token: SeCreatePagefilePrivilege 208 svchost.exe Token: SeSecurityPrivilege 1796 TiWorker.exe Token: SeRestorePrivilege 1796 TiWorker.exe Token: SeBackupPrivilege 1796 TiWorker.exe Token: SeBackupPrivilege 1796 TiWorker.exe Token: SeRestorePrivilege 1796 TiWorker.exe Token: SeSecurityPrivilege 1796 TiWorker.exe Token: SeBackupPrivilege 1796 TiWorker.exe Token: SeRestorePrivilege 1796 TiWorker.exe Token: SeSecurityPrivilege 1796 TiWorker.exe Token: SeBackupPrivilege 1796 TiWorker.exe Token: SeRestorePrivilege 1796 TiWorker.exe Token: SeSecurityPrivilege 1796 TiWorker.exe Token: SeBackupPrivilege 1796 TiWorker.exe Token: SeRestorePrivilege 1796 TiWorker.exe Token: SeSecurityPrivilege 1796 TiWorker.exe Token: SeBackupPrivilege 1796 TiWorker.exe Token: SeRestorePrivilege 1796 TiWorker.exe Token: SeSecurityPrivilege 1796 TiWorker.exe Token: SeBackupPrivilege 1796 TiWorker.exe Token: SeRestorePrivilege 1796 TiWorker.exe Token: SeSecurityPrivilege 1796 TiWorker.exe Token: SeBackupPrivilege 1796 TiWorker.exe Token: SeRestorePrivilege 1796 TiWorker.exe Token: SeSecurityPrivilege 1796 TiWorker.exe Token: SeBackupPrivilege 1796 TiWorker.exe Token: SeRestorePrivilege 1796 TiWorker.exe Token: SeSecurityPrivilege 1796 TiWorker.exe Token: SeBackupPrivilege 1796 TiWorker.exe Token: SeRestorePrivilege 1796 TiWorker.exe Token: SeSecurityPrivilege 1796 TiWorker.exe Token: SeBackupPrivilege 1796 TiWorker.exe Token: SeRestorePrivilege 1796 TiWorker.exe Token: SeSecurityPrivilege 1796 TiWorker.exe Token: SeBackupPrivilege 1796 TiWorker.exe Token: SeRestorePrivilege 1796 TiWorker.exe Token: SeSecurityPrivilege 1796 TiWorker.exe Token: SeBackupPrivilege 1796 TiWorker.exe Token: SeRestorePrivilege 1796 TiWorker.exe Token: SeSecurityPrivilege 1796 TiWorker.exe Token: SeBackupPrivilege 1796 TiWorker.exe Token: SeRestorePrivilege 1796 TiWorker.exe Token: SeSecurityPrivilege 1796 TiWorker.exe Token: SeBackupPrivilege 1796 TiWorker.exe Token: SeRestorePrivilege 1796 TiWorker.exe Token: SeSecurityPrivilege 1796 TiWorker.exe Token: SeBackupPrivilege 1796 TiWorker.exe Token: SeRestorePrivilege 1796 TiWorker.exe Token: SeSecurityPrivilege 1796 TiWorker.exe Token: SeBackupPrivilege 1796 TiWorker.exe Token: SeRestorePrivilege 1796 TiWorker.exe Token: SeSecurityPrivilege 1796 TiWorker.exe Token: SeBackupPrivilege 1796 TiWorker.exe Token: SeRestorePrivilege 1796 TiWorker.exe Token: SeSecurityPrivilege 1796 TiWorker.exe Token: SeBackupPrivilege 1796 TiWorker.exe Token: SeRestorePrivilege 1796 TiWorker.exe Token: SeSecurityPrivilege 1796 TiWorker.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
0bbdc10d88d7c515c2f93bff4b8607f3029ab6ef0efd8c8022e9d58458d9b6a5.execmd.exedescription pid process target process PID 644 wrote to memory of 1412 644 0bbdc10d88d7c515c2f93bff4b8607f3029ab6ef0efd8c8022e9d58458d9b6a5.exe MediaCenter.exe PID 644 wrote to memory of 1412 644 0bbdc10d88d7c515c2f93bff4b8607f3029ab6ef0efd8c8022e9d58458d9b6a5.exe MediaCenter.exe PID 644 wrote to memory of 1412 644 0bbdc10d88d7c515c2f93bff4b8607f3029ab6ef0efd8c8022e9d58458d9b6a5.exe MediaCenter.exe PID 644 wrote to memory of 5036 644 0bbdc10d88d7c515c2f93bff4b8607f3029ab6ef0efd8c8022e9d58458d9b6a5.exe cmd.exe PID 644 wrote to memory of 5036 644 0bbdc10d88d7c515c2f93bff4b8607f3029ab6ef0efd8c8022e9d58458d9b6a5.exe cmd.exe PID 644 wrote to memory of 5036 644 0bbdc10d88d7c515c2f93bff4b8607f3029ab6ef0efd8c8022e9d58458d9b6a5.exe cmd.exe PID 5036 wrote to memory of 3272 5036 cmd.exe PING.EXE PID 5036 wrote to memory of 3272 5036 cmd.exe PING.EXE PID 5036 wrote to memory of 3272 5036 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\0bbdc10d88d7c515c2f93bff4b8607f3029ab6ef0efd8c8022e9d58458d9b6a5.exe"C:\Users\Admin\AppData\Local\Temp\0bbdc10d88d7c515c2f93bff4b8607f3029ab6ef0efd8c8022e9d58458d9b6a5.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:1412 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\0bbdc10d88d7c515c2f93bff4b8607f3029ab6ef0efd8c8022e9d58458d9b6a5.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:3272
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:208
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1796
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
f87300faad49b19fb1a76316efd644e9
SHA1efa0666b573957df3edb10cab044ac32b9bf0e02
SHA25620f3b3912983903f2b715717cedae206db60ac5c8e9be1ae25269449cae0d4f5
SHA51266629772bd1123155b3c4515135013504e7ec13a096496c4283d775c5c9487d1dbae49e8e140df2d9981c7b8787533d58fec0261992eb587cd39f9a04aa98fce
-
MD5
f87300faad49b19fb1a76316efd644e9
SHA1efa0666b573957df3edb10cab044ac32b9bf0e02
SHA25620f3b3912983903f2b715717cedae206db60ac5c8e9be1ae25269449cae0d4f5
SHA51266629772bd1123155b3c4515135013504e7ec13a096496c4283d775c5c9487d1dbae49e8e140df2d9981c7b8787533d58fec0261992eb587cd39f9a04aa98fce