Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
12-02-2022 10:43
Static task
static1
Behavioral task
behavioral1
Sample
06451651b8740f2a37df76dce775386193e5a6863a7f1da8b961d34bc8a0092d.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
06451651b8740f2a37df76dce775386193e5a6863a7f1da8b961d34bc8a0092d.exe
Resource
win10v2004-en-20220112
General
-
Target
06451651b8740f2a37df76dce775386193e5a6863a7f1da8b961d34bc8a0092d.exe
-
Size
89KB
-
MD5
c2cc1a782491b29ae9ea19b0b329eea0
-
SHA1
e13a86139adcaeec1f429e488a0776b9ea0b0026
-
SHA256
06451651b8740f2a37df76dce775386193e5a6863a7f1da8b961d34bc8a0092d
-
SHA512
1c1b3d537904cc42840f9cdd8b56e10c00f6969f1914645c040cd73754924a828da35896639fd189cd9f8079368d2e322a3389690ed8a4e7e4801ed5257be763
Malware Config
Signatures
-
Sakula Payload 2 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula -
suricata: ET MALWARE SUSPICIOUS UA (iexplore)
suricata: ET MALWARE SUSPICIOUS UA (iexplore)
-
suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1
suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1
-
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 1796 MediaCenter.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2044 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
06451651b8740f2a37df76dce775386193e5a6863a7f1da8b961d34bc8a0092d.exepid process 1932 06451651b8740f2a37df76dce775386193e5a6863a7f1da8b961d34bc8a0092d.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
06451651b8740f2a37df76dce775386193e5a6863a7f1da8b961d34bc8a0092d.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 06451651b8740f2a37df76dce775386193e5a6863a7f1da8b961d34bc8a0092d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
06451651b8740f2a37df76dce775386193e5a6863a7f1da8b961d34bc8a0092d.exedescription pid process Token: SeIncBasePriorityPrivilege 1932 06451651b8740f2a37df76dce775386193e5a6863a7f1da8b961d34bc8a0092d.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
06451651b8740f2a37df76dce775386193e5a6863a7f1da8b961d34bc8a0092d.execmd.exedescription pid process target process PID 1932 wrote to memory of 1796 1932 06451651b8740f2a37df76dce775386193e5a6863a7f1da8b961d34bc8a0092d.exe MediaCenter.exe PID 1932 wrote to memory of 1796 1932 06451651b8740f2a37df76dce775386193e5a6863a7f1da8b961d34bc8a0092d.exe MediaCenter.exe PID 1932 wrote to memory of 1796 1932 06451651b8740f2a37df76dce775386193e5a6863a7f1da8b961d34bc8a0092d.exe MediaCenter.exe PID 1932 wrote to memory of 1796 1932 06451651b8740f2a37df76dce775386193e5a6863a7f1da8b961d34bc8a0092d.exe MediaCenter.exe PID 1932 wrote to memory of 2044 1932 06451651b8740f2a37df76dce775386193e5a6863a7f1da8b961d34bc8a0092d.exe cmd.exe PID 1932 wrote to memory of 2044 1932 06451651b8740f2a37df76dce775386193e5a6863a7f1da8b961d34bc8a0092d.exe cmd.exe PID 1932 wrote to memory of 2044 1932 06451651b8740f2a37df76dce775386193e5a6863a7f1da8b961d34bc8a0092d.exe cmd.exe PID 1932 wrote to memory of 2044 1932 06451651b8740f2a37df76dce775386193e5a6863a7f1da8b961d34bc8a0092d.exe cmd.exe PID 2044 wrote to memory of 1624 2044 cmd.exe PING.EXE PID 2044 wrote to memory of 1624 2044 cmd.exe PING.EXE PID 2044 wrote to memory of 1624 2044 cmd.exe PING.EXE PID 2044 wrote to memory of 1624 2044 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\06451651b8740f2a37df76dce775386193e5a6863a7f1da8b961d34bc8a0092d.exe"C:\Users\Admin\AppData\Local\Temp\06451651b8740f2a37df76dce775386193e5a6863a7f1da8b961d34bc8a0092d.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:1796 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\06451651b8740f2a37df76dce775386193e5a6863a7f1da8b961d34bc8a0092d.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1624
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeMD5
0dd7dbaf3e30f0316650bdb15a661789
SHA15a7ee215fa25fb579127cdbc74646c6559162985
SHA2560bfb89d4644d161a86487807954e22168c011ca8f5c4c26b25da3374a407d774
SHA512020480daf3ec60774479ae3435f0badabe854941b72366386f3237926175f1ea83b57256bc2b88b192111ef2c0101a4d41d2d4249c96e635140ff25cb60f94f8
-
\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeMD5
0dd7dbaf3e30f0316650bdb15a661789
SHA15a7ee215fa25fb579127cdbc74646c6559162985
SHA2560bfb89d4644d161a86487807954e22168c011ca8f5c4c26b25da3374a407d774
SHA512020480daf3ec60774479ae3435f0badabe854941b72366386f3237926175f1ea83b57256bc2b88b192111ef2c0101a4d41d2d4249c96e635140ff25cb60f94f8
-
memory/1932-55-0x0000000076511000-0x0000000076513000-memory.dmpFilesize
8KB