Analysis

  • max time kernel
    163s
  • max time network
    177s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    12-02-2022 11:55

General

  • Target

    02f65dc6f60cd3e1fabd9ea8a7371cef0bf5ca3d102dc5259f1b787b86a6628d.exe

  • Size

    84KB

  • MD5

    5d88fde40b6235f377bfe97a4c7b9e17

  • SHA1

    d6eac4919d1d950503d0f3c70b8f80f4eae4bf08

  • SHA256

    02f65dc6f60cd3e1fabd9ea8a7371cef0bf5ca3d102dc5259f1b787b86a6628d

  • SHA512

    4a0445eafd16d0f0624381d5468e9b0106a574ef9465e5d34cbe5b4937598989f71e2b807efb2ed10e73b1d35156f2fd494476d214a5fdfa2bc0631fadd2a804

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Sakula Payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 49 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\02f65dc6f60cd3e1fabd9ea8a7371cef0bf5ca3d102dc5259f1b787b86a6628d.exe
    "C:\Users\Admin\AppData\Local\Temp\02f65dc6f60cd3e1fabd9ea8a7371cef0bf5ca3d102dc5259f1b787b86a6628d.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:60
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:3640
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\02f65dc6f60cd3e1fabd9ea8a7371cef0bf5ca3d102dc5259f1b787b86a6628d.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3504
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:3012
  • C:\Windows\system32\MusNotifyIcon.exe
    %systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 13
    1⤵
    • Checks processor information in registry
    PID:992
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k NetworkService -p
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    PID:3444
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:408

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    MD5

    86d23a1d13ed70c27ba9a1bdfb50bcfb

    SHA1

    cd501a5d9d2f29d68736f5447e669898764c1a94

    SHA256

    0c69c91626d88bc650dcdebfa64ed02ba17495c10e87834cbc191c30a23bd487

    SHA512

    d72819f572a5d755eca7d85e6e60c6f261ebe1a29e41fcec39c35c5f94773e5906728c46db4c2ecb73f8dce1c1686513f3df8928972197b65c56795e5af7f4b2

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    MD5

    86d23a1d13ed70c27ba9a1bdfb50bcfb

    SHA1

    cd501a5d9d2f29d68736f5447e669898764c1a94

    SHA256

    0c69c91626d88bc650dcdebfa64ed02ba17495c10e87834cbc191c30a23bd487

    SHA512

    d72819f572a5d755eca7d85e6e60c6f261ebe1a29e41fcec39c35c5f94773e5906728c46db4c2ecb73f8dce1c1686513f3df8928972197b65c56795e5af7f4b2