Analysis

  • max time kernel
    130s
  • max time network
    170s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    12-02-2022 09:28

General

  • Target

    09fbc4730ca0873163dc27f4ea266e3e1d3f637aa40a9b2250a551a7b782fa84.exe

  • Size

    60KB

  • MD5

    0b0ecbbe1e694f3ee5c3f2a4108cea14

  • SHA1

    ab37ed186e28b49dc29cb69b6bc80ec46bd7f47d

  • SHA256

    09fbc4730ca0873163dc27f4ea266e3e1d3f637aa40a9b2250a551a7b782fa84

  • SHA512

    2e14b786d1e20b676a6db63a6ae05c34f9f932c24512fbdae5a323e0df814d988c112c2bfd4e91f58f2f767d21f7b3443edbf7831cc8a3bfca9d322caf1a7b69

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\09fbc4730ca0873163dc27f4ea266e3e1d3f637aa40a9b2250a551a7b782fa84.exe
    "C:\Users\Admin\AppData\Local\Temp\09fbc4730ca0873163dc27f4ea266e3e1d3f637aa40a9b2250a551a7b782fa84.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:816
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:460
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\09fbc4730ca0873163dc27f4ea266e3e1d3f637aa40a9b2250a551a7b782fa84.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3960
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:1716
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:4380
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:3576

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    MD5

    6c13f795768ce1e2354a3832e558f2dc

    SHA1

    0ef69f6d33c237363bb58c780595092b3a44bb08

    SHA256

    222ce9b50cf0f0c0d847bb6360a7515071d422184abf7a16db757f3e7ee8995a

    SHA512

    322498924876bca3522bc3b9bedca3b3fb75b36484ce7b85c48f08d1e2cff0119e708a71de4218ee22aecaf5180ffbb1e548627a2643e76458afa34306f424b6

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    MD5

    6c13f795768ce1e2354a3832e558f2dc

    SHA1

    0ef69f6d33c237363bb58c780595092b3a44bb08

    SHA256

    222ce9b50cf0f0c0d847bb6360a7515071d422184abf7a16db757f3e7ee8995a

    SHA512

    322498924876bca3522bc3b9bedca3b3fb75b36484ce7b85c48f08d1e2cff0119e708a71de4218ee22aecaf5180ffbb1e548627a2643e76458afa34306f424b6

  • memory/4380-132-0x000002156E770000-0x000002156E780000-memory.dmp
    Filesize

    64KB

  • memory/4380-133-0x000002156ED20000-0x000002156ED30000-memory.dmp
    Filesize

    64KB

  • memory/4380-134-0x00000215713F0000-0x00000215713F4000-memory.dmp
    Filesize

    16KB