Analysis

  • max time kernel
    118s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    12-02-2022 10:53

General

  • Target

    05ea94bfcd2a9b7928e4b204eff2fe702429bfd9da699ec6adc9782e03048fea.exe

  • Size

    80KB

  • MD5

    3ce1e3223e564ff87d13b0b0dc031311

  • SHA1

    d3c1d16aab63d0589d494a9faa6dbcb3a3348ce9

  • SHA256

    05ea94bfcd2a9b7928e4b204eff2fe702429bfd9da699ec6adc9782e03048fea

  • SHA512

    92e05f03f67d59c873f042eb8ea296d49ceee42a0e778f40fe2cb17150c9d6aeb7a054469d7aa145d01656d647731d8570df3f48b84a6081e6f458d9ab4f8e60

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Sakula Payload 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\05ea94bfcd2a9b7928e4b204eff2fe702429bfd9da699ec6adc9782e03048fea.exe
    "C:\Users\Admin\AppData\Local\Temp\05ea94bfcd2a9b7928e4b204eff2fe702429bfd9da699ec6adc9782e03048fea.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1588
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:1280
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\05ea94bfcd2a9b7928e4b204eff2fe702429bfd9da699ec6adc9782e03048fea.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:944
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:1040

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    MD5

    f1e36c75e837a8221146befb78a2f170

    SHA1

    ebcc74863ea731ec1c7970d156f478756609a486

    SHA256

    41fc5025711f85a1961f0db8c3a25eb0a7a60ed38c65cbfd73958a6d55fa6287

    SHA512

    de39a0643d3949e21449cf82dbb3e66c847d7c40ed12215fe01e25a6c4637e0300358f5bc67f6a97059fd7b36f2b897cbeb86c43d7bf011d7e97d11f1a274bf0

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    MD5

    f1e36c75e837a8221146befb78a2f170

    SHA1

    ebcc74863ea731ec1c7970d156f478756609a486

    SHA256

    41fc5025711f85a1961f0db8c3a25eb0a7a60ed38c65cbfd73958a6d55fa6287

    SHA512

    de39a0643d3949e21449cf82dbb3e66c847d7c40ed12215fe01e25a6c4637e0300358f5bc67f6a97059fd7b36f2b897cbeb86c43d7bf011d7e97d11f1a274bf0

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    MD5

    f1e36c75e837a8221146befb78a2f170

    SHA1

    ebcc74863ea731ec1c7970d156f478756609a486

    SHA256

    41fc5025711f85a1961f0db8c3a25eb0a7a60ed38c65cbfd73958a6d55fa6287

    SHA512

    de39a0643d3949e21449cf82dbb3e66c847d7c40ed12215fe01e25a6c4637e0300358f5bc67f6a97059fd7b36f2b897cbeb86c43d7bf011d7e97d11f1a274bf0

  • memory/1588-55-0x0000000075801000-0x0000000075803000-memory.dmp
    Filesize

    8KB