Analysis
-
max time kernel
136s -
max time network
142s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
12-02-2022 09:25
Static task
static1
Behavioral task
behavioral1
Sample
0a18e5487a8ee71dc598e98700a892f12153eac95b6def6df4e20cada3cda0f4.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
0a18e5487a8ee71dc598e98700a892f12153eac95b6def6df4e20cada3cda0f4.exe
Resource
win10v2004-en-20220113
General
-
Target
0a18e5487a8ee71dc598e98700a892f12153eac95b6def6df4e20cada3cda0f4.exe
-
Size
168KB
-
MD5
bd278f5147954991e57dedbaff2443fe
-
SHA1
3abf713b29c71a7a96af042b0778dd745a7a7883
-
SHA256
0a18e5487a8ee71dc598e98700a892f12153eac95b6def6df4e20cada3cda0f4
-
SHA512
17f3c1d6756c6c6429908d4601ae60af6768a0f52136ba5c826f61096d514d1f2dc5ac6e01d7e5664d577d73aff2eadb71e78bec6b7a9954e0a27441e730417b
Malware Config
Signatures
-
Sakula Payload 4 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula behavioral1/memory/1148-59-0x0000000000400000-0x0000000000420000-memory.dmp family_sakula behavioral1/memory/1140-60-0x0000000000400000-0x0000000000420000-memory.dmp family_sakula -
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 1140 MediaCenter.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2044 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
0a18e5487a8ee71dc598e98700a892f12153eac95b6def6df4e20cada3cda0f4.exepid process 1148 0a18e5487a8ee71dc598e98700a892f12153eac95b6def6df4e20cada3cda0f4.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
0a18e5487a8ee71dc598e98700a892f12153eac95b6def6df4e20cada3cda0f4.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 0a18e5487a8ee71dc598e98700a892f12153eac95b6def6df4e20cada3cda0f4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
0a18e5487a8ee71dc598e98700a892f12153eac95b6def6df4e20cada3cda0f4.exedescription pid process Token: SeIncBasePriorityPrivilege 1148 0a18e5487a8ee71dc598e98700a892f12153eac95b6def6df4e20cada3cda0f4.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
0a18e5487a8ee71dc598e98700a892f12153eac95b6def6df4e20cada3cda0f4.execmd.exedescription pid process target process PID 1148 wrote to memory of 1140 1148 0a18e5487a8ee71dc598e98700a892f12153eac95b6def6df4e20cada3cda0f4.exe MediaCenter.exe PID 1148 wrote to memory of 1140 1148 0a18e5487a8ee71dc598e98700a892f12153eac95b6def6df4e20cada3cda0f4.exe MediaCenter.exe PID 1148 wrote to memory of 1140 1148 0a18e5487a8ee71dc598e98700a892f12153eac95b6def6df4e20cada3cda0f4.exe MediaCenter.exe PID 1148 wrote to memory of 1140 1148 0a18e5487a8ee71dc598e98700a892f12153eac95b6def6df4e20cada3cda0f4.exe MediaCenter.exe PID 1148 wrote to memory of 2044 1148 0a18e5487a8ee71dc598e98700a892f12153eac95b6def6df4e20cada3cda0f4.exe cmd.exe PID 1148 wrote to memory of 2044 1148 0a18e5487a8ee71dc598e98700a892f12153eac95b6def6df4e20cada3cda0f4.exe cmd.exe PID 1148 wrote to memory of 2044 1148 0a18e5487a8ee71dc598e98700a892f12153eac95b6def6df4e20cada3cda0f4.exe cmd.exe PID 1148 wrote to memory of 2044 1148 0a18e5487a8ee71dc598e98700a892f12153eac95b6def6df4e20cada3cda0f4.exe cmd.exe PID 2044 wrote to memory of 1692 2044 cmd.exe PING.EXE PID 2044 wrote to memory of 1692 2044 cmd.exe PING.EXE PID 2044 wrote to memory of 1692 2044 cmd.exe PING.EXE PID 2044 wrote to memory of 1692 2044 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a18e5487a8ee71dc598e98700a892f12153eac95b6def6df4e20cada3cda0f4.exe"C:\Users\Admin\AppData\Local\Temp\0a18e5487a8ee71dc598e98700a892f12153eac95b6def6df4e20cada3cda0f4.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:1140 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\0a18e5487a8ee71dc598e98700a892f12153eac95b6def6df4e20cada3cda0f4.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1692
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeMD5
03f61df6a969d8fa81996c51b082885f
SHA1a9cdcd947a41ce4a8e1c68169e811aaa8779cfb8
SHA2567b704570f747ff553615785a1ea3f6f2e5d366669f2adf565cef1fcc9e5e9e98
SHA5120455a6308793d21987f67ebcb203e40316a5fa06a50d29fa8947c273a908cf4ef2bbe7810e1442e67b638f8fd31dafb8170957241ae6f770cc4077c112bfb001
-
\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeMD5
03f61df6a969d8fa81996c51b082885f
SHA1a9cdcd947a41ce4a8e1c68169e811aaa8779cfb8
SHA2567b704570f747ff553615785a1ea3f6f2e5d366669f2adf565cef1fcc9e5e9e98
SHA5120455a6308793d21987f67ebcb203e40316a5fa06a50d29fa8947c273a908cf4ef2bbe7810e1442e67b638f8fd31dafb8170957241ae6f770cc4077c112bfb001
-
memory/1140-60-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1148-55-0x0000000076511000-0x0000000076513000-memory.dmpFilesize
8KB
-
memory/1148-59-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB