Analysis

  • max time kernel
    120s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    12-02-2022 10:42

General

  • Target

    06558491f7fc15b9c33d957023c6d9f484a0840a7f8d8f59e55ddd22b161adfc.exe

  • Size

    192KB

  • MD5

    7ae2ec6401abf2b6daf721c8d9fbc4a9

  • SHA1

    cf32414f736b4812551e4cf05a6fe601d1f45cd0

  • SHA256

    06558491f7fc15b9c33d957023c6d9f484a0840a7f8d8f59e55ddd22b161adfc

  • SHA512

    5a01f148590c8eb7dc11299c41d9fd5f4fbefa384312559d844b1504b90ddf7ad9432e64bf6245f67538de7817c42e99d0d3190097e9fabdebab6a5030b1ba1c

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Sakula Payload 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\06558491f7fc15b9c33d957023c6d9f484a0840a7f8d8f59e55ddd22b161adfc.exe
    "C:\Users\Admin\AppData\Local\Temp\06558491f7fc15b9c33d957023c6d9f484a0840a7f8d8f59e55ddd22b161adfc.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1172
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:656
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\06558491f7fc15b9c33d957023c6d9f484a0840a7f8d8f59e55ddd22b161adfc.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:1976
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:1108

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    MD5

    99202ba8d4d186f6270165dccd091ef5

    SHA1

    e99521c8a8e274e228c6f82b90247527f890a2c8

    SHA256

    af66a68d1819f03a19fd1dd893d1317b934d0f3223ecfff1a4d878afe6286354

    SHA512

    49155d40297910c8ef761634442e1eda5d93cbe61044e69430253640d65e274e2f92bc2cd29dd53cfb9dba5b4bf275b90c7cb8d883fae1f10215071a12112096

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    MD5

    99202ba8d4d186f6270165dccd091ef5

    SHA1

    e99521c8a8e274e228c6f82b90247527f890a2c8

    SHA256

    af66a68d1819f03a19fd1dd893d1317b934d0f3223ecfff1a4d878afe6286354

    SHA512

    49155d40297910c8ef761634442e1eda5d93cbe61044e69430253640d65e274e2f92bc2cd29dd53cfb9dba5b4bf275b90c7cb8d883fae1f10215071a12112096

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    MD5

    99202ba8d4d186f6270165dccd091ef5

    SHA1

    e99521c8a8e274e228c6f82b90247527f890a2c8

    SHA256

    af66a68d1819f03a19fd1dd893d1317b934d0f3223ecfff1a4d878afe6286354

    SHA512

    49155d40297910c8ef761634442e1eda5d93cbe61044e69430253640d65e274e2f92bc2cd29dd53cfb9dba5b4bf275b90c7cb8d883fae1f10215071a12112096

  • memory/1172-54-0x0000000074F01000-0x0000000074F03000-memory.dmp
    Filesize

    8KB