Analysis

  • max time kernel
    135s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    03-06-2022 13:34

General

  • Target

    130d67c50bd649897b9198b090f6137b792a8415a03abf04b13063eaa93ac678.exe

  • Size

    19KB

  • MD5

    4f3cfe776b67016579985dcae493079c

  • SHA1

    d7f77c3dabc8ee72bbaee9c8dcd5bfe79ce2f777

  • SHA256

    130d67c50bd649897b9198b090f6137b792a8415a03abf04b13063eaa93ac678

  • SHA512

    3b767573ad3919b7765a64ba31134e0a19a297fb72a4c9f7f89e72e3f9f0d1d69807a838d762c993cfa2bba1fa6f55c7c360296599b7f4d9e10c7923ae425066

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • suricata: ET MALWARE Possible DEEP PANDA C2 Activity

    suricata: ET MALWARE Possible DEEP PANDA C2 Activity

  • suricata: ET MALWARE Possible Deep Panda - Sakula/Mivast RAT CnC Beacon 5

    suricata: ET MALWARE Possible Deep Panda - Sakula/Mivast RAT CnC Beacon 5

  • suricata: ET MALWARE Sakula/Mivast C2 Activity

    suricata: ET MALWARE Sakula/Mivast C2 Activity

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\130d67c50bd649897b9198b090f6137b792a8415a03abf04b13063eaa93ac678.exe
    "C:\Users\Admin\AppData\Local\Temp\130d67c50bd649897b9198b090f6137b792a8415a03abf04b13063eaa93ac678.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1156
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v "MicroMedia" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1656
      • C:\Windows\SysWOW64\reg.exe
        reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v "MicroMedia" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"
        3⤵
        • Adds Run key to start application
        • Modifies registry key
        PID:624
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1836
      • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
        C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
        3⤵
        • Executes dropped EXE
        PID:1640
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c ping 127.0.0.1 & del "C:\Users\Admin\AppData\Local\Temp\130d67c50bd649897b9198b090f6137b792a8415a03abf04b13063eaa93ac678.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:900
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:1660

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Remote System Discovery

1
T1018

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    Filesize

    19KB

    MD5

    e233a6fa76ec1bf0534d1a8cf22319a8

    SHA1

    1bc539d08e3f7c926e7ccfbd4ed5c51ec8d6a72b

    SHA256

    061abbcf69694f86543b572c9e0930c1c349e7c7406a58d34cec2ede2e86886c

    SHA512

    2ee2b7d909a193e560667be69c020bbb3b5100f90f1854f96b7dc2f9e0c8df2d0b9e302416ada7a18c81bfa0b31b477b5934855d2ad19b7f33604d90b4dfb00d

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    Filesize

    19KB

    MD5

    e233a6fa76ec1bf0534d1a8cf22319a8

    SHA1

    1bc539d08e3f7c926e7ccfbd4ed5c51ec8d6a72b

    SHA256

    061abbcf69694f86543b572c9e0930c1c349e7c7406a58d34cec2ede2e86886c

    SHA512

    2ee2b7d909a193e560667be69c020bbb3b5100f90f1854f96b7dc2f9e0c8df2d0b9e302416ada7a18c81bfa0b31b477b5934855d2ad19b7f33604d90b4dfb00d

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    Filesize

    19KB

    MD5

    e233a6fa76ec1bf0534d1a8cf22319a8

    SHA1

    1bc539d08e3f7c926e7ccfbd4ed5c51ec8d6a72b

    SHA256

    061abbcf69694f86543b572c9e0930c1c349e7c7406a58d34cec2ede2e86886c

    SHA512

    2ee2b7d909a193e560667be69c020bbb3b5100f90f1854f96b7dc2f9e0c8df2d0b9e302416ada7a18c81bfa0b31b477b5934855d2ad19b7f33604d90b4dfb00d

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    Filesize

    19KB

    MD5

    e233a6fa76ec1bf0534d1a8cf22319a8

    SHA1

    1bc539d08e3f7c926e7ccfbd4ed5c51ec8d6a72b

    SHA256

    061abbcf69694f86543b572c9e0930c1c349e7c7406a58d34cec2ede2e86886c

    SHA512

    2ee2b7d909a193e560667be69c020bbb3b5100f90f1854f96b7dc2f9e0c8df2d0b9e302416ada7a18c81bfa0b31b477b5934855d2ad19b7f33604d90b4dfb00d

  • memory/624-66-0x0000000000000000-mapping.dmp
  • memory/900-59-0x0000000000000000-mapping.dmp
  • memory/1156-54-0x00000000755C1000-0x00000000755C3000-memory.dmp
    Filesize

    8KB

  • memory/1156-55-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/1156-56-0x0000000000020000-0x0000000000024000-memory.dmp
    Filesize

    16KB

  • memory/1156-60-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/1640-64-0x0000000000000000-mapping.dmp
  • memory/1640-70-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/1640-71-0x0000000000020000-0x0000000000024000-memory.dmp
    Filesize

    16KB

  • memory/1640-72-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/1640-75-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/1656-57-0x0000000000000000-mapping.dmp
  • memory/1660-65-0x0000000000000000-mapping.dmp
  • memory/1836-58-0x0000000000000000-mapping.dmp
  • memory/1836-69-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/1836-73-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/1836-74-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB