Analysis

  • max time kernel
    163s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    12-02-2022 09:22

General

  • Target

    0a43a158bccd20a4664fdadd93b4f227de7b416477edf4f14172515205f61bbd.exe

  • Size

    35KB

  • MD5

    38adc97e5679cfe0cee877853b9db756

  • SHA1

    170b1c65028b62a6b34f8be2bec6d61dd9cb0580

  • SHA256

    0a43a158bccd20a4664fdadd93b4f227de7b416477edf4f14172515205f61bbd

  • SHA512

    71be28083d7c7473caccbba8c4b628ef35c2039e6898d76fde9679ac869ca84d2b420411fb0a6b99e9123bc9cf55d1133fbda3fdeef1aa1f52ce1416bbea6317

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 51 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a43a158bccd20a4664fdadd93b4f227de7b416477edf4f14172515205f61bbd.exe
    "C:\Users\Admin\AppData\Local\Temp\0a43a158bccd20a4664fdadd93b4f227de7b416477edf4f14172515205f61bbd.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1576
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:1660
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\0a43a158bccd20a4664fdadd93b4f227de7b416477edf4f14172515205f61bbd.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4084
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:3860
  • C:\Windows\system32\MusNotifyIcon.exe
    %systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 13
    1⤵
    • Checks processor information in registry
    PID:2772
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k NetworkService -p
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    PID:2700
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:3092

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    MD5

    2ff75a2697b1815a29610be77cf57c84

    SHA1

    14cea20d6709bd52c80619fd0cffeabbb4ddf80f

    SHA256

    3bb555b8c2f7b7b4ab87d017a60ff7a18d276692c3dd35abc551b1874bc40d3d

    SHA512

    b57d81e52e26153ced58e64ea00534047ed231461fd26319cbc3f2a6af7b7049f80e8098d705de49f97039dd6e4a5fbc76872283dfe3ac11c39a63aa91360107

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    MD5

    2ff75a2697b1815a29610be77cf57c84

    SHA1

    14cea20d6709bd52c80619fd0cffeabbb4ddf80f

    SHA256

    3bb555b8c2f7b7b4ab87d017a60ff7a18d276692c3dd35abc551b1874bc40d3d

    SHA512

    b57d81e52e26153ced58e64ea00534047ed231461fd26319cbc3f2a6af7b7049f80e8098d705de49f97039dd6e4a5fbc76872283dfe3ac11c39a63aa91360107