Analysis
-
max time kernel
119s -
max time network
138s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
12-02-2022 12:49
Static task
static1
Behavioral task
behavioral1
Sample
0048d449b8158cfd7a8b05a64b61f741685f07d6f05819ebbcd01f37b4ec5aa7.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
0048d449b8158cfd7a8b05a64b61f741685f07d6f05819ebbcd01f37b4ec5aa7.exe
Resource
win10v2004-en-20220113
General
-
Target
0048d449b8158cfd7a8b05a64b61f741685f07d6f05819ebbcd01f37b4ec5aa7.exe
-
Size
99KB
-
MD5
ba089c29cb7f0c8c8263add8eb883933
-
SHA1
e7da70b8fefc74696771a0d2ffd2a82a2588f08b
-
SHA256
0048d449b8158cfd7a8b05a64b61f741685f07d6f05819ebbcd01f37b4ec5aa7
-
SHA512
6469ca58fc4a97a7935c75857d56dde0543438b39bc8bf1b8ab4dc20c11aebaad0ce2c9d99d2939cef78d20528b04f4602aceaa3a93a051ee6fca8b1f244c7ee
Malware Config
Signatures
-
Sakula Payload 3 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula -
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 1620 MediaCenter.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 520 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
0048d449b8158cfd7a8b05a64b61f741685f07d6f05819ebbcd01f37b4ec5aa7.exepid process 1652 0048d449b8158cfd7a8b05a64b61f741685f07d6f05819ebbcd01f37b4ec5aa7.exe 1652 0048d449b8158cfd7a8b05a64b61f741685f07d6f05819ebbcd01f37b4ec5aa7.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
0048d449b8158cfd7a8b05a64b61f741685f07d6f05819ebbcd01f37b4ec5aa7.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 0048d449b8158cfd7a8b05a64b61f741685f07d6f05819ebbcd01f37b4ec5aa7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
0048d449b8158cfd7a8b05a64b61f741685f07d6f05819ebbcd01f37b4ec5aa7.exedescription pid process Token: SeIncBasePriorityPrivilege 1652 0048d449b8158cfd7a8b05a64b61f741685f07d6f05819ebbcd01f37b4ec5aa7.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
0048d449b8158cfd7a8b05a64b61f741685f07d6f05819ebbcd01f37b4ec5aa7.execmd.exedescription pid process target process PID 1652 wrote to memory of 1620 1652 0048d449b8158cfd7a8b05a64b61f741685f07d6f05819ebbcd01f37b4ec5aa7.exe MediaCenter.exe PID 1652 wrote to memory of 1620 1652 0048d449b8158cfd7a8b05a64b61f741685f07d6f05819ebbcd01f37b4ec5aa7.exe MediaCenter.exe PID 1652 wrote to memory of 1620 1652 0048d449b8158cfd7a8b05a64b61f741685f07d6f05819ebbcd01f37b4ec5aa7.exe MediaCenter.exe PID 1652 wrote to memory of 1620 1652 0048d449b8158cfd7a8b05a64b61f741685f07d6f05819ebbcd01f37b4ec5aa7.exe MediaCenter.exe PID 1652 wrote to memory of 520 1652 0048d449b8158cfd7a8b05a64b61f741685f07d6f05819ebbcd01f37b4ec5aa7.exe cmd.exe PID 1652 wrote to memory of 520 1652 0048d449b8158cfd7a8b05a64b61f741685f07d6f05819ebbcd01f37b4ec5aa7.exe cmd.exe PID 1652 wrote to memory of 520 1652 0048d449b8158cfd7a8b05a64b61f741685f07d6f05819ebbcd01f37b4ec5aa7.exe cmd.exe PID 1652 wrote to memory of 520 1652 0048d449b8158cfd7a8b05a64b61f741685f07d6f05819ebbcd01f37b4ec5aa7.exe cmd.exe PID 520 wrote to memory of 956 520 cmd.exe PING.EXE PID 520 wrote to memory of 956 520 cmd.exe PING.EXE PID 520 wrote to memory of 956 520 cmd.exe PING.EXE PID 520 wrote to memory of 956 520 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\0048d449b8158cfd7a8b05a64b61f741685f07d6f05819ebbcd01f37b4ec5aa7.exe"C:\Users\Admin\AppData\Local\Temp\0048d449b8158cfd7a8b05a64b61f741685f07d6f05819ebbcd01f37b4ec5aa7.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:1620
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\0048d449b8158cfd7a8b05a64b61f741685f07d6f05819ebbcd01f37b4ec5aa7.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:956
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
8ff5394304960b68f2e7bc9327855660
SHA13d127f2194c8a815d776a98a2e5e6bfaf0e87f46
SHA2568129b404dc37509752178f7c468ec7fb91d27e75038f54b9866048c2531bbaee
SHA5121fefa3f359343aff663c602e7993d208b25ffce52e817ca3635cbd226422741222419105c792d7ff20379e62a9a61e7768d1ad32d8e6cd8d62c65eeb1305878b
-
MD5
8ff5394304960b68f2e7bc9327855660
SHA13d127f2194c8a815d776a98a2e5e6bfaf0e87f46
SHA2568129b404dc37509752178f7c468ec7fb91d27e75038f54b9866048c2531bbaee
SHA5121fefa3f359343aff663c602e7993d208b25ffce52e817ca3635cbd226422741222419105c792d7ff20379e62a9a61e7768d1ad32d8e6cd8d62c65eeb1305878b
-
MD5
8ff5394304960b68f2e7bc9327855660
SHA13d127f2194c8a815d776a98a2e5e6bfaf0e87f46
SHA2568129b404dc37509752178f7c468ec7fb91d27e75038f54b9866048c2531bbaee
SHA5121fefa3f359343aff663c602e7993d208b25ffce52e817ca3635cbd226422741222419105c792d7ff20379e62a9a61e7768d1ad32d8e6cd8d62c65eeb1305878b