Analysis

  • max time kernel
    128s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    12-02-2022 10:34

General

  • Target

    06ca6b5bd8860d3a258579c4dcdc49f6342da079b7932801de584000bf077be4.exe

  • Size

    60KB

  • MD5

    310745571d2d913e808483123972acea

  • SHA1

    712894fb1797957fad8f8c5543e66e6ce5ac90a6

  • SHA256

    06ca6b5bd8860d3a258579c4dcdc49f6342da079b7932801de584000bf077be4

  • SHA512

    d9cf1256236e4aee9dd63d97d23f6244931e0c4d05a1f762c13c40a74b6a819f163a2bdab2e224f6f37d95a268ab634a061b39ba5525f6dc1617359682bf5e0d

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\06ca6b5bd8860d3a258579c4dcdc49f6342da079b7932801de584000bf077be4.exe
    "C:\Users\Admin\AppData\Local\Temp\06ca6b5bd8860d3a258579c4dcdc49f6342da079b7932801de584000bf077be4.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2228
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:3644
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\06ca6b5bd8860d3a258579c4dcdc49f6342da079b7932801de584000bf077be4.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:400
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:3840
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:1784
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:1348

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    MD5

    2b2762737ee0703c9ac8ec016073e45d

    SHA1

    c4ed5588c8b92b73fca1c895f44417888db89691

    SHA256

    61b47f33c96f4b6e780ec44267514bb3959650faa351f5590820ca1f3967fba6

    SHA512

    589c4b33cd0ca929a088c917a5f0dbecdd1ac57499ed3075e0b89e018788a938d19d7fea0d231efca2d93c4034427b622d6a17a0ee87605bb4438bec75d0be5b

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    MD5

    2b2762737ee0703c9ac8ec016073e45d

    SHA1

    c4ed5588c8b92b73fca1c895f44417888db89691

    SHA256

    61b47f33c96f4b6e780ec44267514bb3959650faa351f5590820ca1f3967fba6

    SHA512

    589c4b33cd0ca929a088c917a5f0dbecdd1ac57499ed3075e0b89e018788a938d19d7fea0d231efca2d93c4034427b622d6a17a0ee87605bb4438bec75d0be5b

  • memory/1784-132-0x00000238ABF20000-0x00000238ABF30000-memory.dmp
    Filesize

    64KB

  • memory/1784-133-0x00000238ABF80000-0x00000238ABF90000-memory.dmp
    Filesize

    64KB

  • memory/1784-134-0x00000238AE640000-0x00000238AE644000-memory.dmp
    Filesize

    16KB