Analysis

  • max time kernel
    119s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    12-02-2022 08:32

General

  • Target

    0aeb9f9dc2406cfc6ad48ef574344339acadc9d57920a6c85459fe90307a0c28.exe

  • Size

    58KB

  • MD5

    ef571c00ef21d5357d1c47cba3149835

  • SHA1

    c53b7f0afcec3fefa7dff1296c685eae77032ac0

  • SHA256

    0aeb9f9dc2406cfc6ad48ef574344339acadc9d57920a6c85459fe90307a0c28

  • SHA512

    a03ed80b229232a538206baa9fdbb1681fed0e1bc944412219520119dd3aac4e4afaa626d21e3068680f79803c44ad919370d66a2a6dbfa51f874a6c547ee5c5

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0aeb9f9dc2406cfc6ad48ef574344339acadc9d57920a6c85459fe90307a0c28.exe
    "C:\Users\Admin\AppData\Local\Temp\0aeb9f9dc2406cfc6ad48ef574344339acadc9d57920a6c85459fe90307a0c28.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:832
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:1848
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\0aeb9f9dc2406cfc6ad48ef574344339acadc9d57920a6c85459fe90307a0c28.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:396
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:1972

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    MD5

    fa816cac35f042eb71d04d62983c87fd

    SHA1

    def3597a97041d978e106b70ef7716f523b7cfd0

    SHA256

    f3042888e7a05d54e5b6448bdbe5440b86b393ddec62b94722d4e67f402090d0

    SHA512

    8999fe16cd9f2c4310292143cdc436182de1a4becb4eb42d2856094b0cccdb65143400a8c611a4d3b97705727f875465f9b1a72c63e201a52ac39faf153192be

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    MD5

    fa816cac35f042eb71d04d62983c87fd

    SHA1

    def3597a97041d978e106b70ef7716f523b7cfd0

    SHA256

    f3042888e7a05d54e5b6448bdbe5440b86b393ddec62b94722d4e67f402090d0

    SHA512

    8999fe16cd9f2c4310292143cdc436182de1a4becb4eb42d2856094b0cccdb65143400a8c611a4d3b97705727f875465f9b1a72c63e201a52ac39faf153192be

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    MD5

    fa816cac35f042eb71d04d62983c87fd

    SHA1

    def3597a97041d978e106b70ef7716f523b7cfd0

    SHA256

    f3042888e7a05d54e5b6448bdbe5440b86b393ddec62b94722d4e67f402090d0

    SHA512

    8999fe16cd9f2c4310292143cdc436182de1a4becb4eb42d2856094b0cccdb65143400a8c611a4d3b97705727f875465f9b1a72c63e201a52ac39faf153192be

  • memory/832-53-0x0000000075891000-0x0000000075893000-memory.dmp
    Filesize

    8KB