Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
resource tags
arch:x64arch:x86image:win10v2004-20220414-enlocale:en-usos:windows10-2004-x64system -
submitted
16-07-2022 08:13
Behavioral task
behavioral1
Sample
virussign.exe
Resource
win7-20220414-en
General
-
Target
virussign.exe
-
Size
212KB
-
MD5
1bc0e4769e7c8d200892a2b1450961e0
-
SHA1
08b0805ed34458af16a73e494999ad2e8ba83655
-
SHA256
7a3c203d3668423e2bf6e11568ceeac3c5081d06f304db0db39fea341833323e
-
SHA512
406170bf43063a2b18359560d73ef0c3bb0726d3f0d180d3aa02e504ac0cda3eb408606f8932ed35e4e0a84f1d04cbe0fa6212d910a33089dc496d8dd644a502
Malware Config
Signatures
-
Sakula payload 6 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula behavioral2/memory/3000-133-0x0000000000400000-0x0000000000435000-memory.dmp family_sakula behavioral2/memory/4088-134-0x0000000000400000-0x0000000000435000-memory.dmp family_sakula behavioral2/memory/4088-135-0x0000000000400000-0x0000000000435000-memory.dmp family_sakula behavioral2/memory/3000-137-0x0000000000400000-0x0000000000435000-memory.dmp family_sakula -
suricata: ET MALWARE SUSPICIOUS UA (iexplore)
suricata: ET MALWARE SUSPICIOUS UA (iexplore)
-
suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1
suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1
-
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 4088 MediaCenter.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe upx C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe upx behavioral2/memory/3000-133-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral2/memory/4088-134-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral2/memory/4088-135-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral2/memory/3000-137-0x0000000000400000-0x0000000000435000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
virussign.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation virussign.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
virussign.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" virussign.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
virussign.exedescription pid process Token: SeIncBasePriorityPrivilege 3000 virussign.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
virussign.execmd.exedescription pid process target process PID 3000 wrote to memory of 4088 3000 virussign.exe MediaCenter.exe PID 3000 wrote to memory of 4088 3000 virussign.exe MediaCenter.exe PID 3000 wrote to memory of 4088 3000 virussign.exe MediaCenter.exe PID 3000 wrote to memory of 3528 3000 virussign.exe cmd.exe PID 3000 wrote to memory of 3528 3000 virussign.exe cmd.exe PID 3000 wrote to memory of 3528 3000 virussign.exe cmd.exe PID 3528 wrote to memory of 5076 3528 cmd.exe PING.EXE PID 3528 wrote to memory of 5076 3528 cmd.exe PING.EXE PID 3528 wrote to memory of 5076 3528 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\virussign.exe"C:\Users\Admin\AppData\Local\Temp\virussign.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:4088 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\virussign.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:5076
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212KB
MD5349fbefe7935ba6d15c55c1f69f13d95
SHA121b0009e3e4ceb65cf3f11b10b80183bf42239db
SHA25611023e2ad8f91e567c54aa10fbe9110338c8a2d60eacd652d3b7c6f99d465551
SHA5124b68b5404d62b50aac704cac18544163620282f87b6b7219ee663285fdff81c8f4299ff47a9fb9d57ac5af34ae429106ee304218fa16dd9882207e91dbce0baf
-
Filesize
212KB
MD5349fbefe7935ba6d15c55c1f69f13d95
SHA121b0009e3e4ceb65cf3f11b10b80183bf42239db
SHA25611023e2ad8f91e567c54aa10fbe9110338c8a2d60eacd652d3b7c6f99d465551
SHA5124b68b5404d62b50aac704cac18544163620282f87b6b7219ee663285fdff81c8f4299ff47a9fb9d57ac5af34ae429106ee304218fa16dd9882207e91dbce0baf