Analysis
-
max time kernel
138s -
max time network
156s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
12-02-2022 10:17
Static task
static1
Behavioral task
behavioral1
Sample
07aa88884e351c13cfb2001ddbd7c8e47a4ae4e5621b8f123e07ea9c6d362525.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
07aa88884e351c13cfb2001ddbd7c8e47a4ae4e5621b8f123e07ea9c6d362525.exe
Resource
win10v2004-en-20220112
General
-
Target
07aa88884e351c13cfb2001ddbd7c8e47a4ae4e5621b8f123e07ea9c6d362525.exe
-
Size
216KB
-
MD5
e7794f60bf0495c94471ba3ad08c4050
-
SHA1
d65d116567a380c73c3f567ce59c99caca01a5c9
-
SHA256
07aa88884e351c13cfb2001ddbd7c8e47a4ae4e5621b8f123e07ea9c6d362525
-
SHA512
dd2f7c75bb562a0ec2d52c8b261a894c8a1ffa135bc012490b4c11cc15e4c027b4b6e6e2c1a97f181e331231d391df306f5b2e365d78203a74137fb7f9a92161
Malware Config
Signatures
-
Sakula Payload 4 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula behavioral1/memory/1732-59-0x0000000000400000-0x0000000000420000-memory.dmp family_sakula behavioral1/memory/1548-60-0x0000000000400000-0x0000000000420000-memory.dmp family_sakula -
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 1548 MediaCenter.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1212 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
07aa88884e351c13cfb2001ddbd7c8e47a4ae4e5621b8f123e07ea9c6d362525.exepid process 1732 07aa88884e351c13cfb2001ddbd7c8e47a4ae4e5621b8f123e07ea9c6d362525.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
07aa88884e351c13cfb2001ddbd7c8e47a4ae4e5621b8f123e07ea9c6d362525.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 07aa88884e351c13cfb2001ddbd7c8e47a4ae4e5621b8f123e07ea9c6d362525.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
07aa88884e351c13cfb2001ddbd7c8e47a4ae4e5621b8f123e07ea9c6d362525.exedescription pid process Token: SeIncBasePriorityPrivilege 1732 07aa88884e351c13cfb2001ddbd7c8e47a4ae4e5621b8f123e07ea9c6d362525.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
07aa88884e351c13cfb2001ddbd7c8e47a4ae4e5621b8f123e07ea9c6d362525.execmd.exedescription pid process target process PID 1732 wrote to memory of 1548 1732 07aa88884e351c13cfb2001ddbd7c8e47a4ae4e5621b8f123e07ea9c6d362525.exe MediaCenter.exe PID 1732 wrote to memory of 1548 1732 07aa88884e351c13cfb2001ddbd7c8e47a4ae4e5621b8f123e07ea9c6d362525.exe MediaCenter.exe PID 1732 wrote to memory of 1548 1732 07aa88884e351c13cfb2001ddbd7c8e47a4ae4e5621b8f123e07ea9c6d362525.exe MediaCenter.exe PID 1732 wrote to memory of 1548 1732 07aa88884e351c13cfb2001ddbd7c8e47a4ae4e5621b8f123e07ea9c6d362525.exe MediaCenter.exe PID 1732 wrote to memory of 1212 1732 07aa88884e351c13cfb2001ddbd7c8e47a4ae4e5621b8f123e07ea9c6d362525.exe cmd.exe PID 1732 wrote to memory of 1212 1732 07aa88884e351c13cfb2001ddbd7c8e47a4ae4e5621b8f123e07ea9c6d362525.exe cmd.exe PID 1732 wrote to memory of 1212 1732 07aa88884e351c13cfb2001ddbd7c8e47a4ae4e5621b8f123e07ea9c6d362525.exe cmd.exe PID 1732 wrote to memory of 1212 1732 07aa88884e351c13cfb2001ddbd7c8e47a4ae4e5621b8f123e07ea9c6d362525.exe cmd.exe PID 1212 wrote to memory of 1096 1212 cmd.exe PING.EXE PID 1212 wrote to memory of 1096 1212 cmd.exe PING.EXE PID 1212 wrote to memory of 1096 1212 cmd.exe PING.EXE PID 1212 wrote to memory of 1096 1212 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\07aa88884e351c13cfb2001ddbd7c8e47a4ae4e5621b8f123e07ea9c6d362525.exe"C:\Users\Admin\AppData\Local\Temp\07aa88884e351c13cfb2001ddbd7c8e47a4ae4e5621b8f123e07ea9c6d362525.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:1548 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\07aa88884e351c13cfb2001ddbd7c8e47a4ae4e5621b8f123e07ea9c6d362525.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1096
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeMD5
6013347d4a3d6ce485711a06f0736680
SHA10c040930ff55d81718f210eabf44d069a95b97c2
SHA256944fa84908cb88847b382fe0c11844e3eab684133d8b290f6c25a963d22a7f5c
SHA512426f6b10204a8f1b5761774e742cc542de470ec8321c980e05ec892d5392b0faaa2efcab580b9281d1ee9a948d3d3d4e2ad26114e698a9be4235d5372223af70
-
\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeMD5
6013347d4a3d6ce485711a06f0736680
SHA10c040930ff55d81718f210eabf44d069a95b97c2
SHA256944fa84908cb88847b382fe0c11844e3eab684133d8b290f6c25a963d22a7f5c
SHA512426f6b10204a8f1b5761774e742cc542de470ec8321c980e05ec892d5392b0faaa2efcab580b9281d1ee9a948d3d3d4e2ad26114e698a9be4235d5372223af70
-
memory/1548-60-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1732-55-0x0000000074F11000-0x0000000074F13000-memory.dmpFilesize
8KB
-
memory/1732-59-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB