Analysis

  • max time kernel
    120s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    12-02-2022 10:19

General

  • Target

    079c973be2e492ccf4473a58ee5d5d215f5409bd0ce4d0ba8939a8c3e283f06f.exe

  • Size

    101KB

  • MD5

    b217e1adb7688bdee5a4f29e863e46f3

  • SHA1

    08ef874b53c3f930f0bd7d1d52c4c42ba8a24a22

  • SHA256

    079c973be2e492ccf4473a58ee5d5d215f5409bd0ce4d0ba8939a8c3e283f06f

  • SHA512

    584587b307a53f11a80be0bc8ae180683ab854858827de7ef1fcd2d6785031a5c5f3c0a71f13fd6b5e0c15d7eaa5c2a7b5a36cf93113c5487fe81151d82e0168

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Sakula Payload 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\079c973be2e492ccf4473a58ee5d5d215f5409bd0ce4d0ba8939a8c3e283f06f.exe
    "C:\Users\Admin\AppData\Local\Temp\079c973be2e492ccf4473a58ee5d5d215f5409bd0ce4d0ba8939a8c3e283f06f.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1272
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:1632
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\079c973be2e492ccf4473a58ee5d5d215f5409bd0ce4d0ba8939a8c3e283f06f.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:776
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:1096

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    MD5

    069f201a69b31f9c7d88cc8500259a65

    SHA1

    e67aa259f469e772870f1de0451e7abd4422384d

    SHA256

    189064ce421aee5eee842c9a6aee76b75831da282c70ab6706cc8fc388334e21

    SHA512

    6445c2aca9a62a16c6e20f6bf0c62355cc090a36793c83261bd84cbb9cd7b0402fd862235230bea2599dfecf5a64c865d892d0aaf7cb82dfa94cc3e72e29d3a5

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    MD5

    069f201a69b31f9c7d88cc8500259a65

    SHA1

    e67aa259f469e772870f1de0451e7abd4422384d

    SHA256

    189064ce421aee5eee842c9a6aee76b75831da282c70ab6706cc8fc388334e21

    SHA512

    6445c2aca9a62a16c6e20f6bf0c62355cc090a36793c83261bd84cbb9cd7b0402fd862235230bea2599dfecf5a64c865d892d0aaf7cb82dfa94cc3e72e29d3a5

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    MD5

    069f201a69b31f9c7d88cc8500259a65

    SHA1

    e67aa259f469e772870f1de0451e7abd4422384d

    SHA256

    189064ce421aee5eee842c9a6aee76b75831da282c70ab6706cc8fc388334e21

    SHA512

    6445c2aca9a62a16c6e20f6bf0c62355cc090a36793c83261bd84cbb9cd7b0402fd862235230bea2599dfecf5a64c865d892d0aaf7cb82dfa94cc3e72e29d3a5

  • memory/1272-54-0x0000000076421000-0x0000000076423000-memory.dmp
    Filesize

    8KB