Analysis
-
max time kernel
150s -
max time network
168s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
12-02-2022 10:09
Static task
static1
Behavioral task
behavioral1
Sample
07fc84b90f27e51cdd5289edb2572e75d2d2d027b8ee9a8dec037dae8b7f5c24.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
07fc84b90f27e51cdd5289edb2572e75d2d2d027b8ee9a8dec037dae8b7f5c24.exe
Resource
win10v2004-en-20220112
General
-
Target
07fc84b90f27e51cdd5289edb2572e75d2d2d027b8ee9a8dec037dae8b7f5c24.exe
-
Size
216KB
-
MD5
8d6b792d98ae99f8b019e922ae79f9e0
-
SHA1
a42198f1314d8797b4d9f084fe8a4048d7ed1fe1
-
SHA256
07fc84b90f27e51cdd5289edb2572e75d2d2d027b8ee9a8dec037dae8b7f5c24
-
SHA512
8a94144124d3aa74cdb474b59e382111e06c45bbbe10322e7506f84f64ba3faff26b051c49ef4669a6ccf793f7ad9a00868843e77a6d57d26edfd7a934f60100
Malware Config
Signatures
-
Sakula Payload 4 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula behavioral1/memory/1952-59-0x0000000000400000-0x0000000000420000-memory.dmp family_sakula behavioral1/memory/1664-60-0x0000000000400000-0x0000000000420000-memory.dmp family_sakula -
suricata: ET MALWARE SUSPICIOUS UA (iexplore)
suricata: ET MALWARE SUSPICIOUS UA (iexplore)
-
suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1
suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1
-
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 1664 MediaCenter.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1748 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
07fc84b90f27e51cdd5289edb2572e75d2d2d027b8ee9a8dec037dae8b7f5c24.exepid process 1952 07fc84b90f27e51cdd5289edb2572e75d2d2d027b8ee9a8dec037dae8b7f5c24.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
07fc84b90f27e51cdd5289edb2572e75d2d2d027b8ee9a8dec037dae8b7f5c24.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 07fc84b90f27e51cdd5289edb2572e75d2d2d027b8ee9a8dec037dae8b7f5c24.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
07fc84b90f27e51cdd5289edb2572e75d2d2d027b8ee9a8dec037dae8b7f5c24.exedescription pid process Token: SeIncBasePriorityPrivilege 1952 07fc84b90f27e51cdd5289edb2572e75d2d2d027b8ee9a8dec037dae8b7f5c24.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
07fc84b90f27e51cdd5289edb2572e75d2d2d027b8ee9a8dec037dae8b7f5c24.execmd.exedescription pid process target process PID 1952 wrote to memory of 1664 1952 07fc84b90f27e51cdd5289edb2572e75d2d2d027b8ee9a8dec037dae8b7f5c24.exe MediaCenter.exe PID 1952 wrote to memory of 1664 1952 07fc84b90f27e51cdd5289edb2572e75d2d2d027b8ee9a8dec037dae8b7f5c24.exe MediaCenter.exe PID 1952 wrote to memory of 1664 1952 07fc84b90f27e51cdd5289edb2572e75d2d2d027b8ee9a8dec037dae8b7f5c24.exe MediaCenter.exe PID 1952 wrote to memory of 1664 1952 07fc84b90f27e51cdd5289edb2572e75d2d2d027b8ee9a8dec037dae8b7f5c24.exe MediaCenter.exe PID 1952 wrote to memory of 1748 1952 07fc84b90f27e51cdd5289edb2572e75d2d2d027b8ee9a8dec037dae8b7f5c24.exe cmd.exe PID 1952 wrote to memory of 1748 1952 07fc84b90f27e51cdd5289edb2572e75d2d2d027b8ee9a8dec037dae8b7f5c24.exe cmd.exe PID 1952 wrote to memory of 1748 1952 07fc84b90f27e51cdd5289edb2572e75d2d2d027b8ee9a8dec037dae8b7f5c24.exe cmd.exe PID 1952 wrote to memory of 1748 1952 07fc84b90f27e51cdd5289edb2572e75d2d2d027b8ee9a8dec037dae8b7f5c24.exe cmd.exe PID 1748 wrote to memory of 1116 1748 cmd.exe PING.EXE PID 1748 wrote to memory of 1116 1748 cmd.exe PING.EXE PID 1748 wrote to memory of 1116 1748 cmd.exe PING.EXE PID 1748 wrote to memory of 1116 1748 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\07fc84b90f27e51cdd5289edb2572e75d2d2d027b8ee9a8dec037dae8b7f5c24.exe"C:\Users\Admin\AppData\Local\Temp\07fc84b90f27e51cdd5289edb2572e75d2d2d027b8ee9a8dec037dae8b7f5c24.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:1664 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\07fc84b90f27e51cdd5289edb2572e75d2d2d027b8ee9a8dec037dae8b7f5c24.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1116
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeMD5
0683bfc4a3bf72f6c36842b981115096
SHA1cccdf26aa2aa3ff1cf2475fc5e6f8c1e80b3c202
SHA256d7a05fe94711144c72e7e0f9c86d4f6326cc0dad177254580d5eca86acc8fa56
SHA5127cc3047fb58c10c75719959a6ca21e188d5cd44945efc6f24026a55fd413625bf69297db7129b59afc2e6985e8d0025b26809a1c79fec276bf83d865ecbb939f
-
\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeMD5
0683bfc4a3bf72f6c36842b981115096
SHA1cccdf26aa2aa3ff1cf2475fc5e6f8c1e80b3c202
SHA256d7a05fe94711144c72e7e0f9c86d4f6326cc0dad177254580d5eca86acc8fa56
SHA5127cc3047fb58c10c75719959a6ca21e188d5cd44945efc6f24026a55fd413625bf69297db7129b59afc2e6985e8d0025b26809a1c79fec276bf83d865ecbb939f
-
memory/1664-60-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1952-55-0x0000000074B21000-0x0000000074B23000-memory.dmpFilesize
8KB
-
memory/1952-59-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB