Analysis
-
max time kernel
151s -
max time network
173s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
12-02-2022 12:49
Static task
static1
Behavioral task
behavioral1
Sample
0046fa86e5ad1bbca039b611ffb857d82b20e5be272b19b83aa1dc6c90df47c4.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
0046fa86e5ad1bbca039b611ffb857d82b20e5be272b19b83aa1dc6c90df47c4.exe
Resource
win10v2004-en-20220112
General
-
Target
0046fa86e5ad1bbca039b611ffb857d82b20e5be272b19b83aa1dc6c90df47c4.exe
-
Size
80KB
-
MD5
a6974198eb53d0e73896502c65b886bd
-
SHA1
6e69955cb1c8985bd77ec20f440c1b0fcf527bc1
-
SHA256
0046fa86e5ad1bbca039b611ffb857d82b20e5be272b19b83aa1dc6c90df47c4
-
SHA512
4cce15eea75c785dbdb4f0f133f3a15cf8b02323dd4f0fa7173c7d66491d6d5574f059fd57b56e031bc45b976f6839c8d344aa1b54ebca9cc317a4e2bdf4b702
Malware Config
Signatures
-
Sakula Payload 3 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula -
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 1492 MediaCenter.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 436 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
0046fa86e5ad1bbca039b611ffb857d82b20e5be272b19b83aa1dc6c90df47c4.exepid process 1412 0046fa86e5ad1bbca039b611ffb857d82b20e5be272b19b83aa1dc6c90df47c4.exe 1412 0046fa86e5ad1bbca039b611ffb857d82b20e5be272b19b83aa1dc6c90df47c4.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
0046fa86e5ad1bbca039b611ffb857d82b20e5be272b19b83aa1dc6c90df47c4.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 0046fa86e5ad1bbca039b611ffb857d82b20e5be272b19b83aa1dc6c90df47c4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
0046fa86e5ad1bbca039b611ffb857d82b20e5be272b19b83aa1dc6c90df47c4.exedescription pid process Token: SeIncBasePriorityPrivilege 1412 0046fa86e5ad1bbca039b611ffb857d82b20e5be272b19b83aa1dc6c90df47c4.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
0046fa86e5ad1bbca039b611ffb857d82b20e5be272b19b83aa1dc6c90df47c4.execmd.exedescription pid process target process PID 1412 wrote to memory of 1492 1412 0046fa86e5ad1bbca039b611ffb857d82b20e5be272b19b83aa1dc6c90df47c4.exe MediaCenter.exe PID 1412 wrote to memory of 1492 1412 0046fa86e5ad1bbca039b611ffb857d82b20e5be272b19b83aa1dc6c90df47c4.exe MediaCenter.exe PID 1412 wrote to memory of 1492 1412 0046fa86e5ad1bbca039b611ffb857d82b20e5be272b19b83aa1dc6c90df47c4.exe MediaCenter.exe PID 1412 wrote to memory of 1492 1412 0046fa86e5ad1bbca039b611ffb857d82b20e5be272b19b83aa1dc6c90df47c4.exe MediaCenter.exe PID 1412 wrote to memory of 436 1412 0046fa86e5ad1bbca039b611ffb857d82b20e5be272b19b83aa1dc6c90df47c4.exe cmd.exe PID 1412 wrote to memory of 436 1412 0046fa86e5ad1bbca039b611ffb857d82b20e5be272b19b83aa1dc6c90df47c4.exe cmd.exe PID 1412 wrote to memory of 436 1412 0046fa86e5ad1bbca039b611ffb857d82b20e5be272b19b83aa1dc6c90df47c4.exe cmd.exe PID 1412 wrote to memory of 436 1412 0046fa86e5ad1bbca039b611ffb857d82b20e5be272b19b83aa1dc6c90df47c4.exe cmd.exe PID 436 wrote to memory of 1296 436 cmd.exe PING.EXE PID 436 wrote to memory of 1296 436 cmd.exe PING.EXE PID 436 wrote to memory of 1296 436 cmd.exe PING.EXE PID 436 wrote to memory of 1296 436 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\0046fa86e5ad1bbca039b611ffb857d82b20e5be272b19b83aa1dc6c90df47c4.exe"C:\Users\Admin\AppData\Local\Temp\0046fa86e5ad1bbca039b611ffb857d82b20e5be272b19b83aa1dc6c90df47c4.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:1492
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\0046fa86e5ad1bbca039b611ffb857d82b20e5be272b19b83aa1dc6c90df47c4.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1296
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
f1dbc253e02e8a7d4bfb1f03b694ebff
SHA168c9eb121e7ac6d40a75dd6b1a63902d3d488d2a
SHA2563c45155093f6b9f8dda3f11dd5ee3f948b9e91296787bbbc9e34ddcdb1171d2e
SHA51290cc78d2dbf560513e822f531315ca28af6e7f2afedaa970ce60655b2ba754e8f9f0accaa8848875a524f4efc551b2a149ac95b91a7e20c6e7477524671bd0fe
-
MD5
f1dbc253e02e8a7d4bfb1f03b694ebff
SHA168c9eb121e7ac6d40a75dd6b1a63902d3d488d2a
SHA2563c45155093f6b9f8dda3f11dd5ee3f948b9e91296787bbbc9e34ddcdb1171d2e
SHA51290cc78d2dbf560513e822f531315ca28af6e7f2afedaa970ce60655b2ba754e8f9f0accaa8848875a524f4efc551b2a149ac95b91a7e20c6e7477524671bd0fe
-
MD5
f1dbc253e02e8a7d4bfb1f03b694ebff
SHA168c9eb121e7ac6d40a75dd6b1a63902d3d488d2a
SHA2563c45155093f6b9f8dda3f11dd5ee3f948b9e91296787bbbc9e34ddcdb1171d2e
SHA51290cc78d2dbf560513e822f531315ca28af6e7f2afedaa970ce60655b2ba754e8f9f0accaa8848875a524f4efc551b2a149ac95b91a7e20c6e7477524671bd0fe