Analysis

  • max time kernel
    119s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    12-02-2022 11:19

General

  • Target

    04b7d89a90d733d3dc7195349212dbff514520f2bf6898c2070617eacafac490.exe

  • Size

    79KB

  • MD5

    d7ab3ffe61d0a3e4dc4c83ead9dd042b

  • SHA1

    05e60bd5d2aff88057aa493470574f3e798a8a65

  • SHA256

    04b7d89a90d733d3dc7195349212dbff514520f2bf6898c2070617eacafac490

  • SHA512

    e61b1101bd826991dfa782bf183500723d9267fa5e4b203f24a63437a4ce93154308ff4fb3cd70f0eb268df2b93ae4bf8e1405b1b475fe3ba811e27ac4029298

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Sakula Payload 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04b7d89a90d733d3dc7195349212dbff514520f2bf6898c2070617eacafac490.exe
    "C:\Users\Admin\AppData\Local\Temp\04b7d89a90d733d3dc7195349212dbff514520f2bf6898c2070617eacafac490.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1084
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:744
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\04b7d89a90d733d3dc7195349212dbff514520f2bf6898c2070617eacafac490.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:932
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:1980

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    MD5

    c2a334882ca93addc3e9ea14272f6d67

    SHA1

    111fa559c9a1ee292cdf54795e2ed254e8d91e4c

    SHA256

    51b1c0d94a7a4f66074b868f3f4fabaa034a65f860632087570ce1cdc1f72665

    SHA512

    c0d6cf2e3b46f3447877ce94495643f9a52985777562e8ccf0cb77494b8c22478789efd9a5fbdb91072438e8df3b7704d8e873a8d8e0d87b9e6eb8c1708cbac4

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    MD5

    c2a334882ca93addc3e9ea14272f6d67

    SHA1

    111fa559c9a1ee292cdf54795e2ed254e8d91e4c

    SHA256

    51b1c0d94a7a4f66074b868f3f4fabaa034a65f860632087570ce1cdc1f72665

    SHA512

    c0d6cf2e3b46f3447877ce94495643f9a52985777562e8ccf0cb77494b8c22478789efd9a5fbdb91072438e8df3b7704d8e873a8d8e0d87b9e6eb8c1708cbac4

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    MD5

    c2a334882ca93addc3e9ea14272f6d67

    SHA1

    111fa559c9a1ee292cdf54795e2ed254e8d91e4c

    SHA256

    51b1c0d94a7a4f66074b868f3f4fabaa034a65f860632087570ce1cdc1f72665

    SHA512

    c0d6cf2e3b46f3447877ce94495643f9a52985777562e8ccf0cb77494b8c22478789efd9a5fbdb91072438e8df3b7704d8e873a8d8e0d87b9e6eb8c1708cbac4

  • memory/1084-54-0x0000000075341000-0x0000000075343000-memory.dmp
    Filesize

    8KB