Analysis
-
max time kernel
157s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
12-02-2022 11:08
Static task
static1
Behavioral task
behavioral1
Sample
053b945c76c5cde043fe8c46069d6dae3cc5ed03e5302301d4e0b36ed87bc24e.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
053b945c76c5cde043fe8c46069d6dae3cc5ed03e5302301d4e0b36ed87bc24e.exe
Resource
win10v2004-en-20220113
General
-
Target
053b945c76c5cde043fe8c46069d6dae3cc5ed03e5302301d4e0b36ed87bc24e.exe
-
Size
100KB
-
MD5
8f854aec672d051a1a3c6859b9ce84f3
-
SHA1
ccbb2f19bf04b9c190ba21e4d0db7dc2ab22d307
-
SHA256
053b945c76c5cde043fe8c46069d6dae3cc5ed03e5302301d4e0b36ed87bc24e
-
SHA512
0af5e2038956770464fa84afed6807bdff61cb9a5f858bce16373128d474ac52805d6567e903236d11f911710f7d6225c6919b81c0b6123a5ae8b13a86f6b603
Malware Config
Signatures
-
Sakula Payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula -
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 5036 MediaCenter.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
053b945c76c5cde043fe8c46069d6dae3cc5ed03e5302301d4e0b36ed87bc24e.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 053b945c76c5cde043fe8c46069d6dae3cc5ed03e5302301d4e0b36ed87bc24e.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
053b945c76c5cde043fe8c46069d6dae3cc5ed03e5302301d4e0b36ed87bc24e.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 053b945c76c5cde043fe8c46069d6dae3cc5ed03e5302301d4e0b36ed87bc24e.exe -
Drops file in Windows directory 8 IoCs
Processes:
svchost.exeTiWorker.exedescription ioc process File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe File opened for modification C:\Windows\WinSxS\pending.xml TiWorker.exe File opened for modification C:\Windows\WindowsUpdate.log svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
svchost.exe053b945c76c5cde043fe8c46069d6dae3cc5ed03e5302301d4e0b36ed87bc24e.exeTiWorker.exedescription pid process Token: SeShutdownPrivilege 4764 svchost.exe Token: SeCreatePagefilePrivilege 4764 svchost.exe Token: SeShutdownPrivilege 4764 svchost.exe Token: SeCreatePagefilePrivilege 4764 svchost.exe Token: SeShutdownPrivilege 4764 svchost.exe Token: SeCreatePagefilePrivilege 4764 svchost.exe Token: SeIncBasePriorityPrivilege 5096 053b945c76c5cde043fe8c46069d6dae3cc5ed03e5302301d4e0b36ed87bc24e.exe Token: SeSecurityPrivilege 1360 TiWorker.exe Token: SeRestorePrivilege 1360 TiWorker.exe Token: SeBackupPrivilege 1360 TiWorker.exe Token: SeBackupPrivilege 1360 TiWorker.exe Token: SeRestorePrivilege 1360 TiWorker.exe Token: SeSecurityPrivilege 1360 TiWorker.exe Token: SeBackupPrivilege 1360 TiWorker.exe Token: SeRestorePrivilege 1360 TiWorker.exe Token: SeSecurityPrivilege 1360 TiWorker.exe Token: SeBackupPrivilege 1360 TiWorker.exe Token: SeRestorePrivilege 1360 TiWorker.exe Token: SeSecurityPrivilege 1360 TiWorker.exe Token: SeBackupPrivilege 1360 TiWorker.exe Token: SeRestorePrivilege 1360 TiWorker.exe Token: SeSecurityPrivilege 1360 TiWorker.exe Token: SeBackupPrivilege 1360 TiWorker.exe Token: SeRestorePrivilege 1360 TiWorker.exe Token: SeSecurityPrivilege 1360 TiWorker.exe Token: SeBackupPrivilege 1360 TiWorker.exe Token: SeRestorePrivilege 1360 TiWorker.exe Token: SeSecurityPrivilege 1360 TiWorker.exe Token: SeBackupPrivilege 1360 TiWorker.exe Token: SeRestorePrivilege 1360 TiWorker.exe Token: SeSecurityPrivilege 1360 TiWorker.exe Token: SeBackupPrivilege 1360 TiWorker.exe Token: SeRestorePrivilege 1360 TiWorker.exe Token: SeSecurityPrivilege 1360 TiWorker.exe Token: SeBackupPrivilege 1360 TiWorker.exe Token: SeRestorePrivilege 1360 TiWorker.exe Token: SeSecurityPrivilege 1360 TiWorker.exe Token: SeBackupPrivilege 1360 TiWorker.exe Token: SeRestorePrivilege 1360 TiWorker.exe Token: SeSecurityPrivilege 1360 TiWorker.exe Token: SeBackupPrivilege 1360 TiWorker.exe Token: SeRestorePrivilege 1360 TiWorker.exe Token: SeSecurityPrivilege 1360 TiWorker.exe Token: SeBackupPrivilege 1360 TiWorker.exe Token: SeRestorePrivilege 1360 TiWorker.exe Token: SeSecurityPrivilege 1360 TiWorker.exe Token: SeBackupPrivilege 1360 TiWorker.exe Token: SeRestorePrivilege 1360 TiWorker.exe Token: SeSecurityPrivilege 1360 TiWorker.exe Token: SeBackupPrivilege 1360 TiWorker.exe Token: SeRestorePrivilege 1360 TiWorker.exe Token: SeSecurityPrivilege 1360 TiWorker.exe Token: SeBackupPrivilege 1360 TiWorker.exe Token: SeRestorePrivilege 1360 TiWorker.exe Token: SeSecurityPrivilege 1360 TiWorker.exe Token: SeBackupPrivilege 1360 TiWorker.exe Token: SeRestorePrivilege 1360 TiWorker.exe Token: SeSecurityPrivilege 1360 TiWorker.exe Token: SeBackupPrivilege 1360 TiWorker.exe Token: SeRestorePrivilege 1360 TiWorker.exe Token: SeSecurityPrivilege 1360 TiWorker.exe Token: SeBackupPrivilege 1360 TiWorker.exe Token: SeRestorePrivilege 1360 TiWorker.exe Token: SeSecurityPrivilege 1360 TiWorker.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
053b945c76c5cde043fe8c46069d6dae3cc5ed03e5302301d4e0b36ed87bc24e.execmd.exedescription pid process target process PID 5096 wrote to memory of 5036 5096 053b945c76c5cde043fe8c46069d6dae3cc5ed03e5302301d4e0b36ed87bc24e.exe MediaCenter.exe PID 5096 wrote to memory of 5036 5096 053b945c76c5cde043fe8c46069d6dae3cc5ed03e5302301d4e0b36ed87bc24e.exe MediaCenter.exe PID 5096 wrote to memory of 5036 5096 053b945c76c5cde043fe8c46069d6dae3cc5ed03e5302301d4e0b36ed87bc24e.exe MediaCenter.exe PID 5096 wrote to memory of 4940 5096 053b945c76c5cde043fe8c46069d6dae3cc5ed03e5302301d4e0b36ed87bc24e.exe cmd.exe PID 5096 wrote to memory of 4940 5096 053b945c76c5cde043fe8c46069d6dae3cc5ed03e5302301d4e0b36ed87bc24e.exe cmd.exe PID 5096 wrote to memory of 4940 5096 053b945c76c5cde043fe8c46069d6dae3cc5ed03e5302301d4e0b36ed87bc24e.exe cmd.exe PID 4940 wrote to memory of 3468 4940 cmd.exe PING.EXE PID 4940 wrote to memory of 3468 4940 cmd.exe PING.EXE PID 4940 wrote to memory of 3468 4940 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\053b945c76c5cde043fe8c46069d6dae3cc5ed03e5302301d4e0b36ed87bc24e.exe"C:\Users\Admin\AppData\Local\Temp\053b945c76c5cde043fe8c46069d6dae3cc5ed03e5302301d4e0b36ed87bc24e.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:5036 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\053b945c76c5cde043fe8c46069d6dae3cc5ed03e5302301d4e0b36ed87bc24e.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:3468
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4764
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1360
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeMD5
33209ae1313268368f44828c81b687fe
SHA11ae3cfc15c8fe3a1aa10846c1ab8fc7480258214
SHA25659a1e2f1bc4348812a35752dce96bc41406d1c10f7b8d5da38ca6b3dcba6d6eb
SHA512b9197d8fcded8e162555fbdac2cc118e969d4c81b08381d5d445fede358b68a3a0923eed840c925bc1423270acc1e97fab669d9bf2fb0c75cfc524fca3b78e58
-
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeMD5
33209ae1313268368f44828c81b687fe
SHA11ae3cfc15c8fe3a1aa10846c1ab8fc7480258214
SHA25659a1e2f1bc4348812a35752dce96bc41406d1c10f7b8d5da38ca6b3dcba6d6eb
SHA512b9197d8fcded8e162555fbdac2cc118e969d4c81b08381d5d445fede358b68a3a0923eed840c925bc1423270acc1e97fab669d9bf2fb0c75cfc524fca3b78e58
-
memory/4764-132-0x000001F0DF740000-0x000001F0DF750000-memory.dmpFilesize
64KB
-
memory/4764-133-0x000001F0DF7A0000-0x000001F0DF7B0000-memory.dmpFilesize
64KB
-
memory/4764-134-0x000001F0E24C0000-0x000001F0E24C4000-memory.dmpFilesize
16KB