Analysis

  • max time kernel
    151s
  • max time network
    167s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    12-02-2022 09:28

General

  • Target

    09fbc4730ca0873163dc27f4ea266e3e1d3f637aa40a9b2250a551a7b782fa84.exe

  • Size

    60KB

  • MD5

    0b0ecbbe1e694f3ee5c3f2a4108cea14

  • SHA1

    ab37ed186e28b49dc29cb69b6bc80ec46bd7f47d

  • SHA256

    09fbc4730ca0873163dc27f4ea266e3e1d3f637aa40a9b2250a551a7b782fa84

  • SHA512

    2e14b786d1e20b676a6db63a6ae05c34f9f932c24512fbdae5a323e0df814d988c112c2bfd4e91f58f2f767d21f7b3443edbf7831cc8a3bfca9d322caf1a7b69

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\09fbc4730ca0873163dc27f4ea266e3e1d3f637aa40a9b2250a551a7b782fa84.exe
    "C:\Users\Admin\AppData\Local\Temp\09fbc4730ca0873163dc27f4ea266e3e1d3f637aa40a9b2250a551a7b782fa84.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:944
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:1688
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\09fbc4730ca0873163dc27f4ea266e3e1d3f637aa40a9b2250a551a7b782fa84.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:1868
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:1168

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    MD5

    c8e61dac387cc30c36e28528b6a19518

    SHA1

    6d7b7eaf1a8512061bfd2c17c350a0f9d45c19b5

    SHA256

    396255f82f324b3ba550bec6174851742eb58a6c5cc7f4a87fccfc1713be29e8

    SHA512

    50a095c6c2956c260057882d7be469e70aea8ae0a1b2dbdb49faa1eaac81e3c5e275dd0288de33be84ad07044d7abdddb9083be4bb9c831910cd4cec1b0bd97e

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    MD5

    c8e61dac387cc30c36e28528b6a19518

    SHA1

    6d7b7eaf1a8512061bfd2c17c350a0f9d45c19b5

    SHA256

    396255f82f324b3ba550bec6174851742eb58a6c5cc7f4a87fccfc1713be29e8

    SHA512

    50a095c6c2956c260057882d7be469e70aea8ae0a1b2dbdb49faa1eaac81e3c5e275dd0288de33be84ad07044d7abdddb9083be4bb9c831910cd4cec1b0bd97e

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    MD5

    c8e61dac387cc30c36e28528b6a19518

    SHA1

    6d7b7eaf1a8512061bfd2c17c350a0f9d45c19b5

    SHA256

    396255f82f324b3ba550bec6174851742eb58a6c5cc7f4a87fccfc1713be29e8

    SHA512

    50a095c6c2956c260057882d7be469e70aea8ae0a1b2dbdb49faa1eaac81e3c5e275dd0288de33be84ad07044d7abdddb9083be4bb9c831910cd4cec1b0bd97e

  • memory/944-54-0x0000000076151000-0x0000000076153000-memory.dmp
    Filesize

    8KB