Analysis

  • max time kernel
    157s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    12-02-2022 12:49

General

  • Target

    003f2f75faeb4947e207cab89323392c5e2bf869152f7a8a67e16c978932056b.exe

  • Size

    99KB

  • MD5

    797fa82b5d6824b1600e0a9570e0618a

  • SHA1

    f5b6db72c6a9c4fc1cb4303b6146511dca736069

  • SHA256

    003f2f75faeb4947e207cab89323392c5e2bf869152f7a8a67e16c978932056b

  • SHA512

    51245a8264f0d7bc0e94695a1c67e0e00fd76c1fef2521da589a9e27c42de6f9ba0602e2345e38a2dc482802b6760bfe90ef41f5530dd483325cba6d087c1808

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Sakula Payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\003f2f75faeb4947e207cab89323392c5e2bf869152f7a8a67e16c978932056b.exe
    "C:\Users\Admin\AppData\Local\Temp\003f2f75faeb4947e207cab89323392c5e2bf869152f7a8a67e16c978932056b.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4456
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:3460
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\003f2f75faeb4947e207cab89323392c5e2bf869152f7a8a67e16c978932056b.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3720
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:1240
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:4248
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:4488

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    a5130b81d00df60faa62c40d60f14d54

    SHA1

    2a0d0c382fceab632ce8e4f43755daf1abe27646

    SHA256

    aa8964ffaf50d8c371b11517999e961a3a353d8cc73cb8589abbb179c12dbf6c

    SHA512

    1001bf80aac306dc3fd9b11cd8fa7810696031d0660bc22065608231a64d2ad13e831e988bdc093ee2ff86539e0035e1382500cb77c430265f11ce8e9fa6903e

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    a5130b81d00df60faa62c40d60f14d54

    SHA1

    2a0d0c382fceab632ce8e4f43755daf1abe27646

    SHA256

    aa8964ffaf50d8c371b11517999e961a3a353d8cc73cb8589abbb179c12dbf6c

    SHA512

    1001bf80aac306dc3fd9b11cd8fa7810696031d0660bc22065608231a64d2ad13e831e988bdc093ee2ff86539e0035e1382500cb77c430265f11ce8e9fa6903e

  • memory/4248-132-0x0000014C4E590000-0x0000014C4E5A0000-memory.dmp

    Filesize

    64KB

  • memory/4248-133-0x0000014C4EC20000-0x0000014C4EC30000-memory.dmp

    Filesize

    64KB

  • memory/4248-134-0x0000014C51310000-0x0000014C51314000-memory.dmp

    Filesize

    16KB