Analysis
-
max time kernel
138s -
max time network
151s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
12-02-2022 10:31
Static task
static1
Behavioral task
behavioral1
Sample
06e8eff4bb98c420d6de1ccfb7bad8041613833e47386e9cad242cc854253dba.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
06e8eff4bb98c420d6de1ccfb7bad8041613833e47386e9cad242cc854253dba.exe
Resource
win10v2004-en-20220113
General
-
Target
06e8eff4bb98c420d6de1ccfb7bad8041613833e47386e9cad242cc854253dba.exe
-
Size
176KB
-
MD5
ecc41c4b69f563988d3a778598708f5b
-
SHA1
72278ca602fc8e2843d39ed6339e1c7b231acfc5
-
SHA256
06e8eff4bb98c420d6de1ccfb7bad8041613833e47386e9cad242cc854253dba
-
SHA512
1a09b67e415ee2583bc439ed21c634bc68787843609f863eb56aa4eee4090cb425d9693bbfce4d7afed824e1cb47f1f5f24399268c2d740d4ccf55aa156b1924
Malware Config
Signatures
-
Sakula Payload 4 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula behavioral1/memory/1668-59-0x0000000000400000-0x0000000000420000-memory.dmp family_sakula behavioral1/memory/1088-60-0x0000000000400000-0x0000000000420000-memory.dmp family_sakula -
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 1088 MediaCenter.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1604 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
06e8eff4bb98c420d6de1ccfb7bad8041613833e47386e9cad242cc854253dba.exepid process 1668 06e8eff4bb98c420d6de1ccfb7bad8041613833e47386e9cad242cc854253dba.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
06e8eff4bb98c420d6de1ccfb7bad8041613833e47386e9cad242cc854253dba.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 06e8eff4bb98c420d6de1ccfb7bad8041613833e47386e9cad242cc854253dba.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
06e8eff4bb98c420d6de1ccfb7bad8041613833e47386e9cad242cc854253dba.exedescription pid process Token: SeIncBasePriorityPrivilege 1668 06e8eff4bb98c420d6de1ccfb7bad8041613833e47386e9cad242cc854253dba.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
06e8eff4bb98c420d6de1ccfb7bad8041613833e47386e9cad242cc854253dba.execmd.exedescription pid process target process PID 1668 wrote to memory of 1088 1668 06e8eff4bb98c420d6de1ccfb7bad8041613833e47386e9cad242cc854253dba.exe MediaCenter.exe PID 1668 wrote to memory of 1088 1668 06e8eff4bb98c420d6de1ccfb7bad8041613833e47386e9cad242cc854253dba.exe MediaCenter.exe PID 1668 wrote to memory of 1088 1668 06e8eff4bb98c420d6de1ccfb7bad8041613833e47386e9cad242cc854253dba.exe MediaCenter.exe PID 1668 wrote to memory of 1088 1668 06e8eff4bb98c420d6de1ccfb7bad8041613833e47386e9cad242cc854253dba.exe MediaCenter.exe PID 1668 wrote to memory of 1604 1668 06e8eff4bb98c420d6de1ccfb7bad8041613833e47386e9cad242cc854253dba.exe cmd.exe PID 1668 wrote to memory of 1604 1668 06e8eff4bb98c420d6de1ccfb7bad8041613833e47386e9cad242cc854253dba.exe cmd.exe PID 1668 wrote to memory of 1604 1668 06e8eff4bb98c420d6de1ccfb7bad8041613833e47386e9cad242cc854253dba.exe cmd.exe PID 1668 wrote to memory of 1604 1668 06e8eff4bb98c420d6de1ccfb7bad8041613833e47386e9cad242cc854253dba.exe cmd.exe PID 1604 wrote to memory of 1140 1604 cmd.exe PING.EXE PID 1604 wrote to memory of 1140 1604 cmd.exe PING.EXE PID 1604 wrote to memory of 1140 1604 cmd.exe PING.EXE PID 1604 wrote to memory of 1140 1604 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\06e8eff4bb98c420d6de1ccfb7bad8041613833e47386e9cad242cc854253dba.exe"C:\Users\Admin\AppData\Local\Temp\06e8eff4bb98c420d6de1ccfb7bad8041613833e47386e9cad242cc854253dba.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:1088 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\06e8eff4bb98c420d6de1ccfb7bad8041613833e47386e9cad242cc854253dba.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1140
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeMD5
d07f81763ffe50aab8cc3af9bb554ea8
SHA143e884f8f5cc173aaf562a1b0b43b17d286b0ca2
SHA256ae595fc2f230c87d1ac8149cad973976745b5f3d42a2cf53b36fa5eb0d014754
SHA51249621b963b2f7ec37527faf81dab178b7fd96893f5e8491705fdfad45af0ca279dbc9ae549409d49550277b6c4012da2b5b995c1d6fad05053c1ba209f5cf5dc
-
\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeMD5
d07f81763ffe50aab8cc3af9bb554ea8
SHA143e884f8f5cc173aaf562a1b0b43b17d286b0ca2
SHA256ae595fc2f230c87d1ac8149cad973976745b5f3d42a2cf53b36fa5eb0d014754
SHA51249621b963b2f7ec37527faf81dab178b7fd96893f5e8491705fdfad45af0ca279dbc9ae549409d49550277b6c4012da2b5b995c1d6fad05053c1ba209f5cf5dc
-
memory/1088-60-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1668-55-0x0000000076921000-0x0000000076923000-memory.dmpFilesize
8KB
-
memory/1668-59-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB