Analysis
-
max time kernel
139s -
max time network
167s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
12-02-2022 10:30
Static task
static1
Behavioral task
behavioral1
Sample
06fb5176b3f15def9ad5f57dced880f8a5447a6bf02c0505b91948c3d6aca18d.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
06fb5176b3f15def9ad5f57dced880f8a5447a6bf02c0505b91948c3d6aca18d.exe
Resource
win10v2004-en-20220113
General
-
Target
06fb5176b3f15def9ad5f57dced880f8a5447a6bf02c0505b91948c3d6aca18d.exe
-
Size
92KB
-
MD5
c3bd1e32dea8240ceb09cd0ecbaa299a
-
SHA1
8dfc315a66d58470b4fc096574c250adc7703632
-
SHA256
06fb5176b3f15def9ad5f57dced880f8a5447a6bf02c0505b91948c3d6aca18d
-
SHA512
b4b8a98c8ef4cdaab1303ae3ee5c6808d839543f6762deb8afa4981ae752932fc07923edc399f6da665d4e0087ba795af300484cbf0028069d2af3f74f8154cf
Malware Config
Signatures
-
Sakula Payload 2 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula -
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 1624 MediaCenter.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 752 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
06fb5176b3f15def9ad5f57dced880f8a5447a6bf02c0505b91948c3d6aca18d.exepid process 1608 06fb5176b3f15def9ad5f57dced880f8a5447a6bf02c0505b91948c3d6aca18d.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
06fb5176b3f15def9ad5f57dced880f8a5447a6bf02c0505b91948c3d6aca18d.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 06fb5176b3f15def9ad5f57dced880f8a5447a6bf02c0505b91948c3d6aca18d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
06fb5176b3f15def9ad5f57dced880f8a5447a6bf02c0505b91948c3d6aca18d.exedescription pid process Token: SeIncBasePriorityPrivilege 1608 06fb5176b3f15def9ad5f57dced880f8a5447a6bf02c0505b91948c3d6aca18d.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
06fb5176b3f15def9ad5f57dced880f8a5447a6bf02c0505b91948c3d6aca18d.execmd.exedescription pid process target process PID 1608 wrote to memory of 1624 1608 06fb5176b3f15def9ad5f57dced880f8a5447a6bf02c0505b91948c3d6aca18d.exe MediaCenter.exe PID 1608 wrote to memory of 1624 1608 06fb5176b3f15def9ad5f57dced880f8a5447a6bf02c0505b91948c3d6aca18d.exe MediaCenter.exe PID 1608 wrote to memory of 1624 1608 06fb5176b3f15def9ad5f57dced880f8a5447a6bf02c0505b91948c3d6aca18d.exe MediaCenter.exe PID 1608 wrote to memory of 1624 1608 06fb5176b3f15def9ad5f57dced880f8a5447a6bf02c0505b91948c3d6aca18d.exe MediaCenter.exe PID 1608 wrote to memory of 752 1608 06fb5176b3f15def9ad5f57dced880f8a5447a6bf02c0505b91948c3d6aca18d.exe cmd.exe PID 1608 wrote to memory of 752 1608 06fb5176b3f15def9ad5f57dced880f8a5447a6bf02c0505b91948c3d6aca18d.exe cmd.exe PID 1608 wrote to memory of 752 1608 06fb5176b3f15def9ad5f57dced880f8a5447a6bf02c0505b91948c3d6aca18d.exe cmd.exe PID 1608 wrote to memory of 752 1608 06fb5176b3f15def9ad5f57dced880f8a5447a6bf02c0505b91948c3d6aca18d.exe cmd.exe PID 752 wrote to memory of 1184 752 cmd.exe PING.EXE PID 752 wrote to memory of 1184 752 cmd.exe PING.EXE PID 752 wrote to memory of 1184 752 cmd.exe PING.EXE PID 752 wrote to memory of 1184 752 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\06fb5176b3f15def9ad5f57dced880f8a5447a6bf02c0505b91948c3d6aca18d.exe"C:\Users\Admin\AppData\Local\Temp\06fb5176b3f15def9ad5f57dced880f8a5447a6bf02c0505b91948c3d6aca18d.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:1624 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\06fb5176b3f15def9ad5f57dced880f8a5447a6bf02c0505b91948c3d6aca18d.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1184
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeMD5
dada2a1a3f8d1cee398426492bce2b0f
SHA1ab5dd0a624ecab53e4279f66482ea9b9435f1430
SHA256897b2f7eef28cdf1a686b6129d53e229d417d54238ff3a3792c095930d6104a6
SHA512c947a33b72f88fdefac132cd5f1f61edabf73585bec55c5372d9b95afcd41e25198f558f6739709910159cce3403f98d6c485928e9bfaa27ff79bc41193136b1
-
\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeMD5
dada2a1a3f8d1cee398426492bce2b0f
SHA1ab5dd0a624ecab53e4279f66482ea9b9435f1430
SHA256897b2f7eef28cdf1a686b6129d53e229d417d54238ff3a3792c095930d6104a6
SHA512c947a33b72f88fdefac132cd5f1f61edabf73585bec55c5372d9b95afcd41e25198f558f6739709910159cce3403f98d6c485928e9bfaa27ff79bc41193136b1
-
memory/1608-55-0x0000000075AC1000-0x0000000075AC3000-memory.dmpFilesize
8KB