Analysis

  • max time kernel
    135s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-10-2022 01:30

General

  • Target

    1a81e9a720d63a7e5534fa8101daacfb89fceb1cbd2dc53be16d9f27651bd137.exe

  • Size

    60KB

  • MD5

    2d86ea35b749cd52aeff4d266e16fa76

  • SHA1

    13ddadc253699a608d66b473c4bb1cbb03d7ceb2

  • SHA256

    1a81e9a720d63a7e5534fa8101daacfb89fceb1cbd2dc53be16d9f27651bd137

  • SHA512

    4f670c031458ab0747a86f4af09c620ed9bce0e216b8732ef2b1e74f415f6d9463e55087c5bc4afd413e8c695478af51123d22e3fbff37f2b2663ccff42e7886

  • SSDEEP

    1536:iZioIoCwbYP4nuEApQK4TQbtY2gA9DX+ytBO8c3G3eTJ/a:iEoIlwIguEA4c5DgA9DOyq0eFi

Malware Config

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Sakula payload 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1a81e9a720d63a7e5534fa8101daacfb89fceb1cbd2dc53be16d9f27651bd137.exe
    "C:\Users\Admin\AppData\Local\Temp\1a81e9a720d63a7e5534fa8101daacfb89fceb1cbd2dc53be16d9f27651bd137.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4252
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:4976
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\1a81e9a720d63a7e5534fa8101daacfb89fceb1cbd2dc53be16d9f27651bd137.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1836
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:3276

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    Filesize

    60KB

    MD5

    368d6cf63990b33361f17c6fd4207b66

    SHA1

    2a21c172c32a3ebfe40ccf0679156b696c2ab3ef

    SHA256

    60c306fd67449c3b6246861da5758e486837d3d3facc839b5bba70fe00dfc014

    SHA512

    59d5abfb978f2fcd6a0510da339cd044c3c78a064d239dee00b517f4f23089a5af480a79f0b525e5a268f913cb3fc4faed8bc78da32a4a110d4603fb0b001e2f

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    Filesize

    60KB

    MD5

    368d6cf63990b33361f17c6fd4207b66

    SHA1

    2a21c172c32a3ebfe40ccf0679156b696c2ab3ef

    SHA256

    60c306fd67449c3b6246861da5758e486837d3d3facc839b5bba70fe00dfc014

    SHA512

    59d5abfb978f2fcd6a0510da339cd044c3c78a064d239dee00b517f4f23089a5af480a79f0b525e5a268f913cb3fc4faed8bc78da32a4a110d4603fb0b001e2f

  • memory/1836-138-0x0000000000000000-mapping.dmp
  • memory/3276-140-0x0000000000000000-mapping.dmp
  • memory/4252-135-0x0000000000400000-0x000000000041A000-memory.dmp
    Filesize

    104KB

  • memory/4252-139-0x0000000000400000-0x000000000041A000-memory.dmp
    Filesize

    104KB

  • memory/4976-132-0x0000000000000000-mapping.dmp
  • memory/4976-136-0x0000000000400000-0x000000000041A000-memory.dmp
    Filesize

    104KB

  • memory/4976-137-0x0000000000400000-0x000000000041A000-memory.dmp
    Filesize

    104KB