Analysis

  • max time kernel
    128s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    12-02-2022 09:22

General

  • Target

    0a43a158bccd20a4664fdadd93b4f227de7b416477edf4f14172515205f61bbd.exe

  • Size

    35KB

  • MD5

    38adc97e5679cfe0cee877853b9db756

  • SHA1

    170b1c65028b62a6b34f8be2bec6d61dd9cb0580

  • SHA256

    0a43a158bccd20a4664fdadd93b4f227de7b416477edf4f14172515205f61bbd

  • SHA512

    71be28083d7c7473caccbba8c4b628ef35c2039e6898d76fde9679ac869ca84d2b420411fb0a6b99e9123bc9cf55d1133fbda3fdeef1aa1f52ce1416bbea6317

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a43a158bccd20a4664fdadd93b4f227de7b416477edf4f14172515205f61bbd.exe
    "C:\Users\Admin\AppData\Local\Temp\0a43a158bccd20a4664fdadd93b4f227de7b416477edf4f14172515205f61bbd.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1204
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:1600
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\0a43a158bccd20a4664fdadd93b4f227de7b416477edf4f14172515205f61bbd.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:1060
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:1736

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    MD5

    cbe3762f4bf9a590aefaf62e578f8892

    SHA1

    b791087d000b1deccdded5b103ae36399e3d0d58

    SHA256

    25005d75501dd90aefb8cfda232f1b20690491dbcb8487bfcd2dcac337322cf2

    SHA512

    ca62cbd93e3bb17f6eb5683ace79ce1a7db09ad1a8fcd7b76f2fca05d022b22936ad4695a6662fe4ec4ec2075b03e4854353fab0e6e11100dcb95d77a1f2d01e

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    MD5

    cbe3762f4bf9a590aefaf62e578f8892

    SHA1

    b791087d000b1deccdded5b103ae36399e3d0d58

    SHA256

    25005d75501dd90aefb8cfda232f1b20690491dbcb8487bfcd2dcac337322cf2

    SHA512

    ca62cbd93e3bb17f6eb5683ace79ce1a7db09ad1a8fcd7b76f2fca05d022b22936ad4695a6662fe4ec4ec2075b03e4854353fab0e6e11100dcb95d77a1f2d01e

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    MD5

    cbe3762f4bf9a590aefaf62e578f8892

    SHA1

    b791087d000b1deccdded5b103ae36399e3d0d58

    SHA256

    25005d75501dd90aefb8cfda232f1b20690491dbcb8487bfcd2dcac337322cf2

    SHA512

    ca62cbd93e3bb17f6eb5683ace79ce1a7db09ad1a8fcd7b76f2fca05d022b22936ad4695a6662fe4ec4ec2075b03e4854353fab0e6e11100dcb95d77a1f2d01e

  • memory/1204-54-0x0000000075CE1000-0x0000000075CE3000-memory.dmp
    Filesize

    8KB