Analysis
-
max time kernel
134s -
max time network
153s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
12-02-2022 09:28
Static task
static1
Behavioral task
behavioral1
Sample
09fc2fbadc2168525225c6604e44c0ef73100be1921dca8afc4aa635a77b9d20.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
09fc2fbadc2168525225c6604e44c0ef73100be1921dca8afc4aa635a77b9d20.exe
Resource
win10v2004-en-20220113
General
-
Target
09fc2fbadc2168525225c6604e44c0ef73100be1921dca8afc4aa635a77b9d20.exe
-
Size
176KB
-
MD5
fcd263bc80d915b2165da9029248cae3
-
SHA1
9b18f844edcfc46304033af66b0dd6673b5688c2
-
SHA256
09fc2fbadc2168525225c6604e44c0ef73100be1921dca8afc4aa635a77b9d20
-
SHA512
8951ca00217407fdc8f2687eed6f310651b0069ee75700ac97849d4ab4ae62c9746a6d8cd25b4201f7ff331df06e3c5d49304a9998285590068cc8768fc5ba65
Malware Config
Signatures
-
Sakula Payload 4 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula behavioral1/memory/1668-59-0x0000000000400000-0x0000000000420000-memory.dmp family_sakula behavioral1/memory/836-61-0x0000000000400000-0x0000000000420000-memory.dmp family_sakula -
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 836 MediaCenter.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 916 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
09fc2fbadc2168525225c6604e44c0ef73100be1921dca8afc4aa635a77b9d20.exepid process 1668 09fc2fbadc2168525225c6604e44c0ef73100be1921dca8afc4aa635a77b9d20.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
09fc2fbadc2168525225c6604e44c0ef73100be1921dca8afc4aa635a77b9d20.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 09fc2fbadc2168525225c6604e44c0ef73100be1921dca8afc4aa635a77b9d20.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
09fc2fbadc2168525225c6604e44c0ef73100be1921dca8afc4aa635a77b9d20.exedescription pid process Token: SeIncBasePriorityPrivilege 1668 09fc2fbadc2168525225c6604e44c0ef73100be1921dca8afc4aa635a77b9d20.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
09fc2fbadc2168525225c6604e44c0ef73100be1921dca8afc4aa635a77b9d20.execmd.exedescription pid process target process PID 1668 wrote to memory of 836 1668 09fc2fbadc2168525225c6604e44c0ef73100be1921dca8afc4aa635a77b9d20.exe MediaCenter.exe PID 1668 wrote to memory of 836 1668 09fc2fbadc2168525225c6604e44c0ef73100be1921dca8afc4aa635a77b9d20.exe MediaCenter.exe PID 1668 wrote to memory of 836 1668 09fc2fbadc2168525225c6604e44c0ef73100be1921dca8afc4aa635a77b9d20.exe MediaCenter.exe PID 1668 wrote to memory of 836 1668 09fc2fbadc2168525225c6604e44c0ef73100be1921dca8afc4aa635a77b9d20.exe MediaCenter.exe PID 1668 wrote to memory of 916 1668 09fc2fbadc2168525225c6604e44c0ef73100be1921dca8afc4aa635a77b9d20.exe cmd.exe PID 1668 wrote to memory of 916 1668 09fc2fbadc2168525225c6604e44c0ef73100be1921dca8afc4aa635a77b9d20.exe cmd.exe PID 1668 wrote to memory of 916 1668 09fc2fbadc2168525225c6604e44c0ef73100be1921dca8afc4aa635a77b9d20.exe cmd.exe PID 1668 wrote to memory of 916 1668 09fc2fbadc2168525225c6604e44c0ef73100be1921dca8afc4aa635a77b9d20.exe cmd.exe PID 916 wrote to memory of 872 916 cmd.exe PING.EXE PID 916 wrote to memory of 872 916 cmd.exe PING.EXE PID 916 wrote to memory of 872 916 cmd.exe PING.EXE PID 916 wrote to memory of 872 916 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\09fc2fbadc2168525225c6604e44c0ef73100be1921dca8afc4aa635a77b9d20.exe"C:\Users\Admin\AppData\Local\Temp\09fc2fbadc2168525225c6604e44c0ef73100be1921dca8afc4aa635a77b9d20.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:836 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\09fc2fbadc2168525225c6604e44c0ef73100be1921dca8afc4aa635a77b9d20.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:872
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeMD5
e85ee140af4327b352736b9657065b89
SHA13c4a3e1f14684ed0ad13f1624acb644ee19831bc
SHA2561ea878ea9f6067d992c3ff6cc11905855305e32f302baea688f9c30f7c6744f8
SHA51242227c66af8b27c7883d3183b7704da04a08483bdb21e05eeb13cf282dde836bd419aacfb9f26798fb36f1cba38e837a6a1cac9352c923d0b6efdcb50d731754
-
\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeMD5
e85ee140af4327b352736b9657065b89
SHA13c4a3e1f14684ed0ad13f1624acb644ee19831bc
SHA2561ea878ea9f6067d992c3ff6cc11905855305e32f302baea688f9c30f7c6744f8
SHA51242227c66af8b27c7883d3183b7704da04a08483bdb21e05eeb13cf282dde836bd419aacfb9f26798fb36f1cba38e837a6a1cac9352c923d0b6efdcb50d731754
-
memory/836-61-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1668-55-0x0000000076641000-0x0000000076643000-memory.dmpFilesize
8KB
-
memory/1668-59-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1668-60-0x0000000000230000-0x0000000000250000-memory.dmpFilesize
128KB