Analysis

  • max time kernel
    165s
  • max time network
    176s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    12-02-2022 09:45

General

  • Target

    0920f3a73c20e84b0ec9c772b6d6a59b3081fad0ed0835b107597dc69f212f4a.exe

  • Size

    36KB

  • MD5

    af88161d1d37b5d04c5ccab07cae0351

  • SHA1

    1f799696b7bfc7227332b76d06dcdd56b89d5884

  • SHA256

    0920f3a73c20e84b0ec9c772b6d6a59b3081fad0ed0835b107597dc69f212f4a

  • SHA512

    7b8f42abdab26a9a61ee8eaef57789dedbe22134add955c4a69a0478b721a598c22d9d9ed209a62e91b0a161405c5175be441fa50e9e3229e7ca94019a574b6c

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 49 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0920f3a73c20e84b0ec9c772b6d6a59b3081fad0ed0835b107597dc69f212f4a.exe
    "C:\Users\Admin\AppData\Local\Temp\0920f3a73c20e84b0ec9c772b6d6a59b3081fad0ed0835b107597dc69f212f4a.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3776
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:3536
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\0920f3a73c20e84b0ec9c772b6d6a59b3081fad0ed0835b107597dc69f212f4a.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2824
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:2996
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k NetworkService -p
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    PID:1868
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:3484

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    MD5

    8936a29c10d76723b73677a54697733c

    SHA1

    3fbb458c631867d9ec05f3b845e4f42ebff5a75c

    SHA256

    172d26ec0da577ee66d67fd11130f6955edf9190f33062cadf9dda3b966d9c99

    SHA512

    c9bbb2ba6c309a76c15fae7c9cbc5c958ce788ee03e3fcb180931071fabc35ec0d848b821fb413ce66e0a9b636563b8abf1ffe540d3c6e208d80621aed7f639a

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    MD5

    8936a29c10d76723b73677a54697733c

    SHA1

    3fbb458c631867d9ec05f3b845e4f42ebff5a75c

    SHA256

    172d26ec0da577ee66d67fd11130f6955edf9190f33062cadf9dda3b966d9c99

    SHA512

    c9bbb2ba6c309a76c15fae7c9cbc5c958ce788ee03e3fcb180931071fabc35ec0d848b821fb413ce66e0a9b636563b8abf1ffe540d3c6e208d80621aed7f639a