Analysis

  • max time kernel
    158s
  • max time network
    170s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    12-02-2022 11:10

General

  • Target

    05249de934c40be0b973c58e980248ff56093985812d22da5d1180b18c0a231d.exe

  • Size

    35KB

  • MD5

    33c7adca31c9cfe134fc111c08fe39b1

  • SHA1

    7edc76d0c90b05e01fdb80b71e563e98606880b7

  • SHA256

    05249de934c40be0b973c58e980248ff56093985812d22da5d1180b18c0a231d

  • SHA512

    62bb165cf036d766c1f534733aa825dfeda7584953177b1799459bf806ca05445e5c8d69078e6e798d75104ba6d10c7a1deb668457a9a72fb10eb78bb7262523

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\05249de934c40be0b973c58e980248ff56093985812d22da5d1180b18c0a231d.exe
    "C:\Users\Admin\AppData\Local\Temp\05249de934c40be0b973c58e980248ff56093985812d22da5d1180b18c0a231d.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1516
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:3808
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\05249de934c40be0b973c58e980248ff56093985812d22da5d1180b18c0a231d.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3916
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:2976
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:3256
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:4700

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    MD5

    a1885a8f5426b3a720e2aefe75e7f96e

    SHA1

    9ecb756fb9d5eb19674aeb11d4b7a048c2bd72b9

    SHA256

    37d680dfb8b542124ca2f881d2030e98cafd35622d8efa1672be4bc019f632f7

    SHA512

    78c08cfca7cc43797f4d91577da45361072cf493c7b42441ec8c7d840ebe30b5cb70eebde158dad3e7f35218d0a7406d645e00a043c6c2b6130199890cbe9321

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    MD5

    a1885a8f5426b3a720e2aefe75e7f96e

    SHA1

    9ecb756fb9d5eb19674aeb11d4b7a048c2bd72b9

    SHA256

    37d680dfb8b542124ca2f881d2030e98cafd35622d8efa1672be4bc019f632f7

    SHA512

    78c08cfca7cc43797f4d91577da45361072cf493c7b42441ec8c7d840ebe30b5cb70eebde158dad3e7f35218d0a7406d645e00a043c6c2b6130199890cbe9321

  • memory/3256-132-0x000001E266190000-0x000001E2661A0000-memory.dmp
    Filesize

    64KB

  • memory/3256-133-0x000001E266820000-0x000001E266830000-memory.dmp
    Filesize

    64KB

  • memory/3256-134-0x000001E268F10000-0x000001E268F14000-memory.dmp
    Filesize

    16KB