Analysis

  • max time kernel
    152s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    12-02-2022 09:32

General

  • Target

    09c3efdb3d2d4d30158fe8aa5c5999e4737a69a324f01861899299afd4b7656a.exe

  • Size

    36KB

  • MD5

    7c2ebaf5c602da0b8ff71651885b1681

  • SHA1

    4405a9e86aa4d20b6d38974c1c2491087921d855

  • SHA256

    09c3efdb3d2d4d30158fe8aa5c5999e4737a69a324f01861899299afd4b7656a

  • SHA512

    2d4dd3dd80657daef48a2c56e8d54ed2c0f40467e536fbab18c4767631ebf574de29b788e95644de55b1e66a969e73671ad783deb950bea18a15b075a6f122ac

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\09c3efdb3d2d4d30158fe8aa5c5999e4737a69a324f01861899299afd4b7656a.exe
    "C:\Users\Admin\AppData\Local\Temp\09c3efdb3d2d4d30158fe8aa5c5999e4737a69a324f01861899299afd4b7656a.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1052
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:2060
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\09c3efdb3d2d4d30158fe8aa5c5999e4737a69a324f01861899299afd4b7656a.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3916
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:1752
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:4956
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:4552

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    MD5

    297df30c75770273f8d764c39ef56716

    SHA1

    58b81cf0f5fc1a39a8bc1480696840983b1ae2f7

    SHA256

    b13385b9b0ab4d654a2eef17e1e339eed7125f755b2102f9bef059283e19cca0

    SHA512

    ad85a530a97c7378988fcca0c0418774d0312afb74becdfe9cfa674493ece27be049c0f6ef4bd290e3791f18a3299cbd6f6008a525cbc26e3a2a2c4c4ecd18c8

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    MD5

    297df30c75770273f8d764c39ef56716

    SHA1

    58b81cf0f5fc1a39a8bc1480696840983b1ae2f7

    SHA256

    b13385b9b0ab4d654a2eef17e1e339eed7125f755b2102f9bef059283e19cca0

    SHA512

    ad85a530a97c7378988fcca0c0418774d0312afb74becdfe9cfa674493ece27be049c0f6ef4bd290e3791f18a3299cbd6f6008a525cbc26e3a2a2c4c4ecd18c8

  • memory/4956-132-0x0000026758330000-0x0000026758340000-memory.dmp
    Filesize

    64KB

  • memory/4956-133-0x0000026758390000-0x00000267583A0000-memory.dmp
    Filesize

    64KB

  • memory/4956-134-0x000002675B080000-0x000002675B084000-memory.dmp
    Filesize

    16KB