Analysis

  • max time kernel
    148s
  • max time network
    169s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    12-02-2022 11:09

General

  • Target

    05294960b24f0fe12f2cd9477b74b66669fea5ffbc3afcb16bbf0c93e0142ec5.exe

  • Size

    35KB

  • MD5

    d01645ad1c6109aebf541d3d93cd4343

  • SHA1

    5d5164f5a39b6c1a1f463960d6ebcb32729c1526

  • SHA256

    05294960b24f0fe12f2cd9477b74b66669fea5ffbc3afcb16bbf0c93e0142ec5

  • SHA512

    d37b79157f5651a50f65c8727e50a3e955afd19338474649af1d05da4af7bb49e4d0814706e39eacd503b6c00276589aca364d352200b9061fedf9a831d0cfa6

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\05294960b24f0fe12f2cd9477b74b66669fea5ffbc3afcb16bbf0c93e0142ec5.exe
    "C:\Users\Admin\AppData\Local\Temp\05294960b24f0fe12f2cd9477b74b66669fea5ffbc3afcb16bbf0c93e0142ec5.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:948
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:1668
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\05294960b24f0fe12f2cd9477b74b66669fea5ffbc3afcb16bbf0c93e0142ec5.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:1848
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:1648

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    MD5

    d3c61cde5cb4f4eea6462036854002d6

    SHA1

    d13aaf43c169bb13e5b53e4dceaeeb25cd3f8f6d

    SHA256

    f489ea661c2f7d7bd6f2b6f644d9dc51a443e79b14aca244856f45916b157e47

    SHA512

    39f648fc1c2b6b88339bca243d6e641b85998d975da9b8cd4a30a370d4523086d8e56abd5ddd6470d312180fb9fd7463b86d396c72b03e06bc34157d906a9bce

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    MD5

    d3c61cde5cb4f4eea6462036854002d6

    SHA1

    d13aaf43c169bb13e5b53e4dceaeeb25cd3f8f6d

    SHA256

    f489ea661c2f7d7bd6f2b6f644d9dc51a443e79b14aca244856f45916b157e47

    SHA512

    39f648fc1c2b6b88339bca243d6e641b85998d975da9b8cd4a30a370d4523086d8e56abd5ddd6470d312180fb9fd7463b86d396c72b03e06bc34157d906a9bce

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    MD5

    d3c61cde5cb4f4eea6462036854002d6

    SHA1

    d13aaf43c169bb13e5b53e4dceaeeb25cd3f8f6d

    SHA256

    f489ea661c2f7d7bd6f2b6f644d9dc51a443e79b14aca244856f45916b157e47

    SHA512

    39f648fc1c2b6b88339bca243d6e641b85998d975da9b8cd4a30a370d4523086d8e56abd5ddd6470d312180fb9fd7463b86d396c72b03e06bc34157d906a9bce

  • memory/948-55-0x0000000075321000-0x0000000075323000-memory.dmp
    Filesize

    8KB