Analysis
-
max time kernel
161s -
max time network
181s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
12-02-2022 12:54
Static task
static1
Behavioral task
behavioral1
Sample
0002eb2dc8868dd7334f823265bc457f495d07e2cb5f2660d1d0b1ef6dc26eac.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
0002eb2dc8868dd7334f823265bc457f495d07e2cb5f2660d1d0b1ef6dc26eac.exe
Resource
win10v2004-en-20220113
General
-
Target
0002eb2dc8868dd7334f823265bc457f495d07e2cb5f2660d1d0b1ef6dc26eac.exe
-
Size
220KB
-
MD5
304db1256cfc41536822fa2e7941e915
-
SHA1
cd90e7d4e39c3d820fa6984776656d237f9bc52a
-
SHA256
0002eb2dc8868dd7334f823265bc457f495d07e2cb5f2660d1d0b1ef6dc26eac
-
SHA512
b643ce753da692e9d08144d16c23fd1434b7db7fb036564d23ec0a6d38c6f04831e90ab4428be61d49146ed8a360121ef000c51e155342629ae495611225e5a5
Malware Config
Signatures
-
Sakula Payload 4 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula behavioral1/memory/828-59-0x0000000000400000-0x0000000000420000-memory.dmp family_sakula behavioral1/memory/1156-60-0x0000000000400000-0x0000000000420000-memory.dmp family_sakula -
suricata: ET MALWARE SUSPICIOUS UA (iexplore)
suricata: ET MALWARE SUSPICIOUS UA (iexplore)
-
suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1
suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1
-
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 1156 MediaCenter.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1712 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
0002eb2dc8868dd7334f823265bc457f495d07e2cb5f2660d1d0b1ef6dc26eac.exepid process 828 0002eb2dc8868dd7334f823265bc457f495d07e2cb5f2660d1d0b1ef6dc26eac.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
0002eb2dc8868dd7334f823265bc457f495d07e2cb5f2660d1d0b1ef6dc26eac.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 0002eb2dc8868dd7334f823265bc457f495d07e2cb5f2660d1d0b1ef6dc26eac.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
0002eb2dc8868dd7334f823265bc457f495d07e2cb5f2660d1d0b1ef6dc26eac.exedescription pid process Token: SeIncBasePriorityPrivilege 828 0002eb2dc8868dd7334f823265bc457f495d07e2cb5f2660d1d0b1ef6dc26eac.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
0002eb2dc8868dd7334f823265bc457f495d07e2cb5f2660d1d0b1ef6dc26eac.execmd.exedescription pid process target process PID 828 wrote to memory of 1156 828 0002eb2dc8868dd7334f823265bc457f495d07e2cb5f2660d1d0b1ef6dc26eac.exe MediaCenter.exe PID 828 wrote to memory of 1156 828 0002eb2dc8868dd7334f823265bc457f495d07e2cb5f2660d1d0b1ef6dc26eac.exe MediaCenter.exe PID 828 wrote to memory of 1156 828 0002eb2dc8868dd7334f823265bc457f495d07e2cb5f2660d1d0b1ef6dc26eac.exe MediaCenter.exe PID 828 wrote to memory of 1156 828 0002eb2dc8868dd7334f823265bc457f495d07e2cb5f2660d1d0b1ef6dc26eac.exe MediaCenter.exe PID 828 wrote to memory of 1712 828 0002eb2dc8868dd7334f823265bc457f495d07e2cb5f2660d1d0b1ef6dc26eac.exe cmd.exe PID 828 wrote to memory of 1712 828 0002eb2dc8868dd7334f823265bc457f495d07e2cb5f2660d1d0b1ef6dc26eac.exe cmd.exe PID 828 wrote to memory of 1712 828 0002eb2dc8868dd7334f823265bc457f495d07e2cb5f2660d1d0b1ef6dc26eac.exe cmd.exe PID 828 wrote to memory of 1712 828 0002eb2dc8868dd7334f823265bc457f495d07e2cb5f2660d1d0b1ef6dc26eac.exe cmd.exe PID 1712 wrote to memory of 1016 1712 cmd.exe PING.EXE PID 1712 wrote to memory of 1016 1712 cmd.exe PING.EXE PID 1712 wrote to memory of 1016 1712 cmd.exe PING.EXE PID 1712 wrote to memory of 1016 1712 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\0002eb2dc8868dd7334f823265bc457f495d07e2cb5f2660d1d0b1ef6dc26eac.exe"C:\Users\Admin\AppData\Local\Temp\0002eb2dc8868dd7334f823265bc457f495d07e2cb5f2660d1d0b1ef6dc26eac.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:1156
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\0002eb2dc8868dd7334f823265bc457f495d07e2cb5f2660d1d0b1ef6dc26eac.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1016
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
b8f5d9c97846d23ae94e35d6f5136fd3
SHA128a207f9021e957012476708e20b994fd4512536
SHA25627360bbfdf7cdea0203719867d47b963017a10c3b79a5a6f24bbb309d20c307e
SHA5125c53a414aa37fca4f82d9a60987dc7eae44cc1189e9b7255bae5799ca0b79f3d4242abfd277a14897f66d0f271ac63a61c0594102137cfe8c517b08fe575023e
-
MD5
b8f5d9c97846d23ae94e35d6f5136fd3
SHA128a207f9021e957012476708e20b994fd4512536
SHA25627360bbfdf7cdea0203719867d47b963017a10c3b79a5a6f24bbb309d20c307e
SHA5125c53a414aa37fca4f82d9a60987dc7eae44cc1189e9b7255bae5799ca0b79f3d4242abfd277a14897f66d0f271ac63a61c0594102137cfe8c517b08fe575023e