Analysis
-
max time kernel
153s -
max time network
167s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
12-02-2022 12:15
Static task
static1
Behavioral task
behavioral1
Sample
0219858b27fc6623ba52625c2ae806b73693512bef386e5d854698e6f340ac32.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
0219858b27fc6623ba52625c2ae806b73693512bef386e5d854698e6f340ac32.exe
Resource
win10v2004-en-20220113
General
-
Target
0219858b27fc6623ba52625c2ae806b73693512bef386e5d854698e6f340ac32.exe
-
Size
216KB
-
MD5
4392e9011f31a2890f169982e279ad79
-
SHA1
c1bc675783b91816fadfaebd73a82589ece92486
-
SHA256
0219858b27fc6623ba52625c2ae806b73693512bef386e5d854698e6f340ac32
-
SHA512
c853609272a230d2e7a01d04e91e31bc75d39cadc3c90e2101223a765796f75e984a475db2db555349c2cffdeaf5f8acae06bc615a0d5417200568a44019dff0
Malware Config
Signatures
-
Sakula Payload 4 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula behavioral1/memory/1520-58-0x0000000000400000-0x0000000000420000-memory.dmp family_sakula behavioral1/memory/808-59-0x0000000000400000-0x0000000000420000-memory.dmp family_sakula -
suricata: ET MALWARE SUSPICIOUS UA (iexplore)
suricata: ET MALWARE SUSPICIOUS UA (iexplore)
-
suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1
suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1
-
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 808 MediaCenter.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 980 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
0219858b27fc6623ba52625c2ae806b73693512bef386e5d854698e6f340ac32.exepid process 1520 0219858b27fc6623ba52625c2ae806b73693512bef386e5d854698e6f340ac32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
0219858b27fc6623ba52625c2ae806b73693512bef386e5d854698e6f340ac32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 0219858b27fc6623ba52625c2ae806b73693512bef386e5d854698e6f340ac32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
0219858b27fc6623ba52625c2ae806b73693512bef386e5d854698e6f340ac32.exedescription pid process Token: SeIncBasePriorityPrivilege 1520 0219858b27fc6623ba52625c2ae806b73693512bef386e5d854698e6f340ac32.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
0219858b27fc6623ba52625c2ae806b73693512bef386e5d854698e6f340ac32.execmd.exedescription pid process target process PID 1520 wrote to memory of 808 1520 0219858b27fc6623ba52625c2ae806b73693512bef386e5d854698e6f340ac32.exe MediaCenter.exe PID 1520 wrote to memory of 808 1520 0219858b27fc6623ba52625c2ae806b73693512bef386e5d854698e6f340ac32.exe MediaCenter.exe PID 1520 wrote to memory of 808 1520 0219858b27fc6623ba52625c2ae806b73693512bef386e5d854698e6f340ac32.exe MediaCenter.exe PID 1520 wrote to memory of 808 1520 0219858b27fc6623ba52625c2ae806b73693512bef386e5d854698e6f340ac32.exe MediaCenter.exe PID 1520 wrote to memory of 980 1520 0219858b27fc6623ba52625c2ae806b73693512bef386e5d854698e6f340ac32.exe cmd.exe PID 1520 wrote to memory of 980 1520 0219858b27fc6623ba52625c2ae806b73693512bef386e5d854698e6f340ac32.exe cmd.exe PID 1520 wrote to memory of 980 1520 0219858b27fc6623ba52625c2ae806b73693512bef386e5d854698e6f340ac32.exe cmd.exe PID 1520 wrote to memory of 980 1520 0219858b27fc6623ba52625c2ae806b73693512bef386e5d854698e6f340ac32.exe cmd.exe PID 980 wrote to memory of 1100 980 cmd.exe PING.EXE PID 980 wrote to memory of 1100 980 cmd.exe PING.EXE PID 980 wrote to memory of 1100 980 cmd.exe PING.EXE PID 980 wrote to memory of 1100 980 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\0219858b27fc6623ba52625c2ae806b73693512bef386e5d854698e6f340ac32.exe"C:\Users\Admin\AppData\Local\Temp\0219858b27fc6623ba52625c2ae806b73693512bef386e5d854698e6f340ac32.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:808
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\0219858b27fc6623ba52625c2ae806b73693512bef386e5d854698e6f340ac32.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1100
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
71b2d1ca031944f5b74922e5d3399233
SHA159f8fb096ec08159cd277463a19fd929b494e63e
SHA256c1b7150bbbda28662e57f17712a79dd514fa5fddcd31887e5b92f8e023b3562b
SHA51281b4806765c13091847e2f20d4a20aae8e1b32efbaeed6833790642047930b6865cc7d5c6186cf8ed62e3cfcf806372b88a7085e22ba46cfc30c720663eed660
-
MD5
71b2d1ca031944f5b74922e5d3399233
SHA159f8fb096ec08159cd277463a19fd929b494e63e
SHA256c1b7150bbbda28662e57f17712a79dd514fa5fddcd31887e5b92f8e023b3562b
SHA51281b4806765c13091847e2f20d4a20aae8e1b32efbaeed6833790642047930b6865cc7d5c6186cf8ed62e3cfcf806372b88a7085e22ba46cfc30c720663eed660