Analysis

  • max time kernel
    142s
  • max time network
    169s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    12-02-2022 11:22

General

  • Target

    048b44ffa904c7420c4f74629b585de101f38e84387186fcbe64f6c933d6c953.exe

  • Size

    99KB

  • MD5

    0a02e96ee0126427ffbeb69acdd41a2f

  • SHA1

    a6f5cad892b065111acdd2062e9df1fae2e94cf6

  • SHA256

    048b44ffa904c7420c4f74629b585de101f38e84387186fcbe64f6c933d6c953

  • SHA512

    cb7e4b520c678bf2d6e4278f052c718e59deb509cceadc071881ae4f45d78ee23d2ea4b8e2a7d4d670173143ec27b0563134c926f90970f4d30120be611c4672

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Sakula Payload 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\048b44ffa904c7420c4f74629b585de101f38e84387186fcbe64f6c933d6c953.exe
    "C:\Users\Admin\AppData\Local\Temp\048b44ffa904c7420c4f74629b585de101f38e84387186fcbe64f6c933d6c953.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:860
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:1716
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\048b44ffa904c7420c4f74629b585de101f38e84387186fcbe64f6c933d6c953.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:976
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:924

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    MD5

    0bb81ab5167052d8c7357f4e35d3323f

    SHA1

    2dfae9c1b7ece99e8b2a9d103b4959ed28bc8b3c

    SHA256

    d022e24aaa000c64af06ede7b4b805452081b5dcae2d99fcfdf12bac529bb6e1

    SHA512

    17865ce30453971f6d684046ae269e4d96c685ca0d99e731aea033bb012d26ab3b4f8f1481a9ff9b3cbeacdc8df61f17dd0de9869c584b0f052c5338d8eb77cb

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    MD5

    0bb81ab5167052d8c7357f4e35d3323f

    SHA1

    2dfae9c1b7ece99e8b2a9d103b4959ed28bc8b3c

    SHA256

    d022e24aaa000c64af06ede7b4b805452081b5dcae2d99fcfdf12bac529bb6e1

    SHA512

    17865ce30453971f6d684046ae269e4d96c685ca0d99e731aea033bb012d26ab3b4f8f1481a9ff9b3cbeacdc8df61f17dd0de9869c584b0f052c5338d8eb77cb

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    MD5

    0bb81ab5167052d8c7357f4e35d3323f

    SHA1

    2dfae9c1b7ece99e8b2a9d103b4959ed28bc8b3c

    SHA256

    d022e24aaa000c64af06ede7b4b805452081b5dcae2d99fcfdf12bac529bb6e1

    SHA512

    17865ce30453971f6d684046ae269e4d96c685ca0d99e731aea033bb012d26ab3b4f8f1481a9ff9b3cbeacdc8df61f17dd0de9869c584b0f052c5338d8eb77cb

  • memory/860-55-0x0000000076731000-0x0000000076733000-memory.dmp
    Filesize

    8KB