Analysis

  • max time kernel
    160s
  • max time network
    172s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    12-02-2022 10:42

General

  • Target

    06558491f7fc15b9c33d957023c6d9f484a0840a7f8d8f59e55ddd22b161adfc.exe

  • Size

    192KB

  • MD5

    7ae2ec6401abf2b6daf721c8d9fbc4a9

  • SHA1

    cf32414f736b4812551e4cf05a6fe601d1f45cd0

  • SHA256

    06558491f7fc15b9c33d957023c6d9f484a0840a7f8d8f59e55ddd22b161adfc

  • SHA512

    5a01f148590c8eb7dc11299c41d9fd5f4fbefa384312559d844b1504b90ddf7ad9432e64bf6245f67538de7817c42e99d0d3190097e9fabdebab6a5030b1ba1c

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Sakula Payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\06558491f7fc15b9c33d957023c6d9f484a0840a7f8d8f59e55ddd22b161adfc.exe
    "C:\Users\Admin\AppData\Local\Temp\06558491f7fc15b9c33d957023c6d9f484a0840a7f8d8f59e55ddd22b161adfc.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1276
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:4076
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\06558491f7fc15b9c33d957023c6d9f484a0840a7f8d8f59e55ddd22b161adfc.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3412
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:3152
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:3388
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2740

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    MD5

    6855063bb759e2b4e72a943cc3cee8de

    SHA1

    2f5f5da7c3cf9d5f30d2afdf9ab417f0d15f7679

    SHA256

    1ddc73980ef012841abd7aae6f42860ca649667fc2d9d1b08da8688d756c19e3

    SHA512

    09a3de888ffae4a206563b17d8e6f115eed3e70511e702789ca2a834210f022c2b8d1bbc858b9ae3e59234a51d9e1ce6f38118e650781e2a79db8464d9fbe40b

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    MD5

    6855063bb759e2b4e72a943cc3cee8de

    SHA1

    2f5f5da7c3cf9d5f30d2afdf9ab417f0d15f7679

    SHA256

    1ddc73980ef012841abd7aae6f42860ca649667fc2d9d1b08da8688d756c19e3

    SHA512

    09a3de888ffae4a206563b17d8e6f115eed3e70511e702789ca2a834210f022c2b8d1bbc858b9ae3e59234a51d9e1ce6f38118e650781e2a79db8464d9fbe40b

  • memory/3388-133-0x000001C0531A0000-0x000001C0531B0000-memory.dmp
    Filesize

    64KB

  • memory/3388-132-0x000001C053130000-0x000001C053140000-memory.dmp
    Filesize

    64KB

  • memory/3388-134-0x000001C055EB0000-0x000001C055EB4000-memory.dmp
    Filesize

    16KB