Analysis

  • max time kernel
    142s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    26-03-2022 03:40

General

  • Target

    962398a8148727431d8a651dcacbb972883559f651f19784a0a0cd9c30c63a2f.exe

  • Size

    42KB

  • MD5

    0df6396e7775f62dba90ff08a846cc34

  • SHA1

    6bbc28cd80acc12f222c45b8ab93a7b34f0d6b48

  • SHA256

    962398a8148727431d8a651dcacbb972883559f651f19784a0a0cd9c30c63a2f

  • SHA512

    7f46b8d2b8f0281d249e626c9e1dcbffe1b8054ea926e3bbb53cceb029d40843a33c986bc6d17ebbec992b395cf288e2b61e37a3d42036eef9c5f1521e24c2df

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\962398a8148727431d8a651dcacbb972883559f651f19784a0a0cd9c30c63a2f.exe
    "C:\Users\Admin\AppData\Local\Temp\962398a8148727431d8a651dcacbb972883559f651f19784a0a0cd9c30c63a2f.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4720
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v "MicroMedia" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5096
      • C:\Windows\SysWOW64\reg.exe
        reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v "MicroMedia" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"
        3⤵
        • Adds Run key to start application
        • Modifies registry key
        PID:560
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4316
      • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
        C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
        3⤵
        • Executes dropped EXE
        PID:3440
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c ping 127.0.0.1 & del "C:\Users\Admin\AppData\Local\Temp\962398a8148727431d8a651dcacbb972883559f651f19784a0a0cd9c30c63a2f.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3720
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:4672

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Remote System Discovery

1
T1018

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    MD5

    c81ab6ef72b6160928df060288c96774

    SHA1

    4536573fd5b7a19580a8d107aba51b88337bb4c3

    SHA256

    167f30bd9f16acffd8de9ae258710d2383aed2a72589fc30d6935387feb8a23f

    SHA512

    728d04a9bc932383d3c687c37eb7dee9a3fd7f5be23c1b3d5f826c4079164811b162cb3f8fee77f922cccc119de949d8a659c2e6043134f13f163b1702c225fa

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    MD5

    c81ab6ef72b6160928df060288c96774

    SHA1

    4536573fd5b7a19580a8d107aba51b88337bb4c3

    SHA256

    167f30bd9f16acffd8de9ae258710d2383aed2a72589fc30d6935387feb8a23f

    SHA512

    728d04a9bc932383d3c687c37eb7dee9a3fd7f5be23c1b3d5f826c4079164811b162cb3f8fee77f922cccc119de949d8a659c2e6043134f13f163b1702c225fa

  • memory/560-135-0x0000000000000000-mapping.dmp
  • memory/3440-136-0x0000000000000000-mapping.dmp
  • memory/3440-139-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/3720-132-0x0000000000000000-mapping.dmp
  • memory/4316-131-0x0000000000000000-mapping.dmp
  • memory/4672-134-0x0000000000000000-mapping.dmp
  • memory/4720-133-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/5096-130-0x0000000000000000-mapping.dmp