Analysis

  • max time kernel
    165s
  • max time network
    175s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    12-02-2022 11:19

General

  • Target

    04aecaa6bd2909c7cc700f0e0b6eb922d227b00409fd4cec9e3f54c49454342a.exe

  • Size

    150KB

  • MD5

    888e8e23f8091cb237feb652bc8652a0

  • SHA1

    8cfde56bdb72810ea21cbbf21654faa745a8208d

  • SHA256

    04aecaa6bd2909c7cc700f0e0b6eb922d227b00409fd4cec9e3f54c49454342a

  • SHA512

    03e9153e17fef008304ebcf207ece03d128e5c250eb2b3980f74e3a26635edd90388884397ea14487173050e1129ba4d3bc26954ea799e8585fd955ec6717ff7

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Sakula Payload 2 IoCs
  • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    suricata: ET MALWARE SUSPICIOUS UA (iexplore)

  • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 54 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04aecaa6bd2909c7cc700f0e0b6eb922d227b00409fd4cec9e3f54c49454342a.exe
    "C:\Users\Admin\AppData\Local\Temp\04aecaa6bd2909c7cc700f0e0b6eb922d227b00409fd4cec9e3f54c49454342a.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4072
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:3676
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\04aecaa6bd2909c7cc700f0e0b6eb922d227b00409fd4cec9e3f54c49454342a.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2708
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:1868
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k NetworkService -p
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    PID:3264
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:3608

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    MD5

    ca54b1ade39d92169330ef68d50338f2

    SHA1

    6b61909498a380ae9ab2551145857fe51c97831a

    SHA256

    c9baee33ff90828ad76565a2e27383f4de2078b59f75bc0f37be0a8b04776935

    SHA512

    5c46dab370ac972f98051bd8269cb7b5fab85f723d1dd482263b4e560cbdebe68a4f8a5f36b78540b0e5927b43a51ae167b2aa79e936297224054739df40c415

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    MD5

    ca54b1ade39d92169330ef68d50338f2

    SHA1

    6b61909498a380ae9ab2551145857fe51c97831a

    SHA256

    c9baee33ff90828ad76565a2e27383f4de2078b59f75bc0f37be0a8b04776935

    SHA512

    5c46dab370ac972f98051bd8269cb7b5fab85f723d1dd482263b4e560cbdebe68a4f8a5f36b78540b0e5927b43a51ae167b2aa79e936297224054739df40c415