Analysis
-
max time kernel
159s -
max time network
174s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
12-02-2022 12:50
Static task
static1
Behavioral task
behavioral1
Sample
002fc9759ddd26b24a0bf3d07d5500cdf3990b9cbee02d8203bc8d3429ef31e5.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
002fc9759ddd26b24a0bf3d07d5500cdf3990b9cbee02d8203bc8d3429ef31e5.exe
Resource
win10v2004-en-20220112
General
-
Target
002fc9759ddd26b24a0bf3d07d5500cdf3990b9cbee02d8203bc8d3429ef31e5.exe
-
Size
88KB
-
MD5
e88fb6dec301b079d9a1d5183980319f
-
SHA1
50bc736a32943a291d939002dbfa727b0a2b9e3d
-
SHA256
002fc9759ddd26b24a0bf3d07d5500cdf3990b9cbee02d8203bc8d3429ef31e5
-
SHA512
342399a278355066cb8466cec922043acc20f3a2561050a77c6e8f63ed20b1d9d51fbb7a732e3f228d91ac54096a9354bfa7598e90f4690fdd74975fbc3e452c
Malware Config
Signatures
-
Sakula Payload 4 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula behavioral1/memory/1072-59-0x0000000000400000-0x0000000000420000-memory.dmp family_sakula behavioral1/memory/528-60-0x0000000000400000-0x0000000000420000-memory.dmp family_sakula -
suricata: ET MALWARE SUSPICIOUS UA (iexplore)
suricata: ET MALWARE SUSPICIOUS UA (iexplore)
-
suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1
suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1
-
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 528 MediaCenter.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 816 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
002fc9759ddd26b24a0bf3d07d5500cdf3990b9cbee02d8203bc8d3429ef31e5.exepid process 1072 002fc9759ddd26b24a0bf3d07d5500cdf3990b9cbee02d8203bc8d3429ef31e5.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
002fc9759ddd26b24a0bf3d07d5500cdf3990b9cbee02d8203bc8d3429ef31e5.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 002fc9759ddd26b24a0bf3d07d5500cdf3990b9cbee02d8203bc8d3429ef31e5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
002fc9759ddd26b24a0bf3d07d5500cdf3990b9cbee02d8203bc8d3429ef31e5.exedescription pid process Token: SeIncBasePriorityPrivilege 1072 002fc9759ddd26b24a0bf3d07d5500cdf3990b9cbee02d8203bc8d3429ef31e5.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
002fc9759ddd26b24a0bf3d07d5500cdf3990b9cbee02d8203bc8d3429ef31e5.execmd.exedescription pid process target process PID 1072 wrote to memory of 528 1072 002fc9759ddd26b24a0bf3d07d5500cdf3990b9cbee02d8203bc8d3429ef31e5.exe MediaCenter.exe PID 1072 wrote to memory of 528 1072 002fc9759ddd26b24a0bf3d07d5500cdf3990b9cbee02d8203bc8d3429ef31e5.exe MediaCenter.exe PID 1072 wrote to memory of 528 1072 002fc9759ddd26b24a0bf3d07d5500cdf3990b9cbee02d8203bc8d3429ef31e5.exe MediaCenter.exe PID 1072 wrote to memory of 528 1072 002fc9759ddd26b24a0bf3d07d5500cdf3990b9cbee02d8203bc8d3429ef31e5.exe MediaCenter.exe PID 1072 wrote to memory of 816 1072 002fc9759ddd26b24a0bf3d07d5500cdf3990b9cbee02d8203bc8d3429ef31e5.exe cmd.exe PID 1072 wrote to memory of 816 1072 002fc9759ddd26b24a0bf3d07d5500cdf3990b9cbee02d8203bc8d3429ef31e5.exe cmd.exe PID 1072 wrote to memory of 816 1072 002fc9759ddd26b24a0bf3d07d5500cdf3990b9cbee02d8203bc8d3429ef31e5.exe cmd.exe PID 1072 wrote to memory of 816 1072 002fc9759ddd26b24a0bf3d07d5500cdf3990b9cbee02d8203bc8d3429ef31e5.exe cmd.exe PID 816 wrote to memory of 836 816 cmd.exe PING.EXE PID 816 wrote to memory of 836 816 cmd.exe PING.EXE PID 816 wrote to memory of 836 816 cmd.exe PING.EXE PID 816 wrote to memory of 836 816 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\002fc9759ddd26b24a0bf3d07d5500cdf3990b9cbee02d8203bc8d3429ef31e5.exe"C:\Users\Admin\AppData\Local\Temp\002fc9759ddd26b24a0bf3d07d5500cdf3990b9cbee02d8203bc8d3429ef31e5.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:528
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\002fc9759ddd26b24a0bf3d07d5500cdf3990b9cbee02d8203bc8d3429ef31e5.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:836
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
5016b743f477de216d1cce4215c6dca4
SHA1421def40c63879db0e52145a64cd9c01f8976393
SHA25650b33171d634bdc0f0d529928f7e840f04fffb5967b6add907e8f38affaa493b
SHA5120e81bf8dfa2dce48f43cb3f6375d4fdf47efeb89a7d736efb1794cfee87707b8ff0702bdeb1eb65210454c09ba3a8a5233af6866bed886343a4e8d626fcf0b79
-
MD5
5016b743f477de216d1cce4215c6dca4
SHA1421def40c63879db0e52145a64cd9c01f8976393
SHA25650b33171d634bdc0f0d529928f7e840f04fffb5967b6add907e8f38affaa493b
SHA5120e81bf8dfa2dce48f43cb3f6375d4fdf47efeb89a7d736efb1794cfee87707b8ff0702bdeb1eb65210454c09ba3a8a5233af6866bed886343a4e8d626fcf0b79