Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    12-02-2022 09:16

General

  • Target

    0a8cbd0f1ea43fce67c368c5a7b5553b0df349af14ac859e249116d57d5f3c9d.exe

  • Size

    58KB

  • MD5

    d9530c2cb7834456efde6bb8b67a7fb6

  • SHA1

    c162f37633ba06bedf2925eb584fa5f35b8cb905

  • SHA256

    0a8cbd0f1ea43fce67c368c5a7b5553b0df349af14ac859e249116d57d5f3c9d

  • SHA512

    424532ee1b662d6b84c0666cb7b280981b006041e3526065d2605716cce982be2644d0b4b2510971f387419198680aff1e069a07c6a1b8cef2ca51dfecc78dac

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a8cbd0f1ea43fce67c368c5a7b5553b0df349af14ac859e249116d57d5f3c9d.exe
    "C:\Users\Admin\AppData\Local\Temp\0a8cbd0f1ea43fce67c368c5a7b5553b0df349af14ac859e249116d57d5f3c9d.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1308
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:1568
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\0a8cbd0f1ea43fce67c368c5a7b5553b0df349af14ac859e249116d57d5f3c9d.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:1792
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:432

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    MD5

    04a2b352f0d96cb568e509e142c522c4

    SHA1

    318e86914e8189dc8ddb097ac66c9c6c8826e5c8

    SHA256

    4609aa17135baba091b66de3123422bd0518f2d2a05ba7ade31e40e14f1e3571

    SHA512

    bbb1e2d19b458f8d1e9d469f1788e7034996a48902030da7e706772eca3318305d38e412dd520376a5534ed6725f751dfa66acd657cebf81711f49b43ab51980

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    MD5

    04a2b352f0d96cb568e509e142c522c4

    SHA1

    318e86914e8189dc8ddb097ac66c9c6c8826e5c8

    SHA256

    4609aa17135baba091b66de3123422bd0518f2d2a05ba7ade31e40e14f1e3571

    SHA512

    bbb1e2d19b458f8d1e9d469f1788e7034996a48902030da7e706772eca3318305d38e412dd520376a5534ed6725f751dfa66acd657cebf81711f49b43ab51980

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    MD5

    04a2b352f0d96cb568e509e142c522c4

    SHA1

    318e86914e8189dc8ddb097ac66c9c6c8826e5c8

    SHA256

    4609aa17135baba091b66de3123422bd0518f2d2a05ba7ade31e40e14f1e3571

    SHA512

    bbb1e2d19b458f8d1e9d469f1788e7034996a48902030da7e706772eca3318305d38e412dd520376a5534ed6725f751dfa66acd657cebf81711f49b43ab51980

  • memory/1308-53-0x0000000075CE1000-0x0000000075CE3000-memory.dmp
    Filesize

    8KB