Analysis

  • max time kernel
    159s
  • max time network
    168s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    12-02-2022 09:59

General

  • Target

    08768317e8119dd0e11ff876a0b9227db7120d0578a9302db713ce356d57e431.exe

  • Size

    89KB

  • MD5

    e24166008f0ce22f27414cfedcd66f28

  • SHA1

    06845d814d192bc14948bb68cc74e22254348015

  • SHA256

    08768317e8119dd0e11ff876a0b9227db7120d0578a9302db713ce356d57e431

  • SHA512

    78fdc1aa09a3019cd0502605541895ffa363de3779f1c97a3345063f7c736abfe569883efca6c440b886134a70790c51c4b28cdae85fbc6203ee6a9614d6556b

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Sakula Payload 2 IoCs
  • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    suricata: ET MALWARE SUSPICIOUS UA (iexplore)

  • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\08768317e8119dd0e11ff876a0b9227db7120d0578a9302db713ce356d57e431.exe
    "C:\Users\Admin\AppData\Local\Temp\08768317e8119dd0e11ff876a0b9227db7120d0578a9302db713ce356d57e431.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1684
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:960
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\08768317e8119dd0e11ff876a0b9227db7120d0578a9302db713ce356d57e431.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:1776
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:432

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    MD5

    281987fcce3a37a39f94a9cbf49f4dc6

    SHA1

    0124f721de5a3f788e4c207fb757c5461a9e7be1

    SHA256

    40e69d7f7ac4690e6dd041fb0f741dfdb98c38b12b9ff15da91974990c8e14e7

    SHA512

    d6f07a6ca18b81bc74245c252a23093a000c8ae57151e762566f0f0f32091eb2eaae2cb0934eefe5aca2ba99955645c30e2138083af3c4da55da445623e0ae1f

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    MD5

    281987fcce3a37a39f94a9cbf49f4dc6

    SHA1

    0124f721de5a3f788e4c207fb757c5461a9e7be1

    SHA256

    40e69d7f7ac4690e6dd041fb0f741dfdb98c38b12b9ff15da91974990c8e14e7

    SHA512

    d6f07a6ca18b81bc74245c252a23093a000c8ae57151e762566f0f0f32091eb2eaae2cb0934eefe5aca2ba99955645c30e2138083af3c4da55da445623e0ae1f

  • memory/1684-54-0x0000000075761000-0x0000000075763000-memory.dmp
    Filesize

    8KB