Analysis

  • max time kernel
    159s
  • max time network
    174s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    12-02-2022 10:35

General

  • Target

    06c071775430c405321033d7aa87389054df7ab6d4c33e760541254ea4d6e660.exe

  • Size

    58KB

  • MD5

    f5304bbb3e5b6f947ecb1c1bb34a6f2f

  • SHA1

    96e8234b77762482f17842475b266ab7b367fb8a

  • SHA256

    06c071775430c405321033d7aa87389054df7ab6d4c33e760541254ea4d6e660

  • SHA512

    f3e9680b2624927cfce258fd45daf143827ffa1bbef661021ec5690736bb8dd9333e689e5f4b7da5e30e958c93e31532040633e502e275bb7ad5163091b65897

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\06c071775430c405321033d7aa87389054df7ab6d4c33e760541254ea4d6e660.exe
    "C:\Users\Admin\AppData\Local\Temp\06c071775430c405321033d7aa87389054df7ab6d4c33e760541254ea4d6e660.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3724
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:3696
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\06c071775430c405321033d7aa87389054df7ab6d4c33e760541254ea4d6e660.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1456
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:2248
  • C:\Windows\system32\MusNotifyIcon.exe
    %systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 13
    1⤵
    • Checks processor information in registry
    PID:3864

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    MD5

    9bf96521295c2c32033c5629f0b0b460

    SHA1

    4f6ea418aeb7db5aa0f7fbe3cc913033c1277a57

    SHA256

    e443364ea97482b90855e8b0785db29f7fe98714ceab5da65874d753726391b2

    SHA512

    58f97ddcca1cca4714fade77e383cf2bad7d764c5de2fa4cd3b3890489343f7831555db508be078404fee1b4277ca006cc33927496e1f61a1c2d1104961034d8

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    MD5

    9bf96521295c2c32033c5629f0b0b460

    SHA1

    4f6ea418aeb7db5aa0f7fbe3cc913033c1277a57

    SHA256

    e443364ea97482b90855e8b0785db29f7fe98714ceab5da65874d753726391b2

    SHA512

    58f97ddcca1cca4714fade77e383cf2bad7d764c5de2fa4cd3b3890489343f7831555db508be078404fee1b4277ca006cc33927496e1f61a1c2d1104961034d8