Analysis
-
max time kernel
143s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
18-10-2022 15:20
Behavioral task
behavioral1
Sample
835e72ea7ba1ebf75a8fe65508d9d2d704d1118731930fa28c8df82153cddd11.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
835e72ea7ba1ebf75a8fe65508d9d2d704d1118731930fa28c8df82153cddd11.exe
Resource
win10v2004-20220812-en
General
-
Target
835e72ea7ba1ebf75a8fe65508d9d2d704d1118731930fa28c8df82153cddd11.exe
-
Size
98KB
-
MD5
f40ce157c94f1046a38c37bc7a384067
-
SHA1
2ba16669dd78a42a158cb0b4f58ebe6f1054c998
-
SHA256
835e72ea7ba1ebf75a8fe65508d9d2d704d1118731930fa28c8df82153cddd11
-
SHA512
b644ff36e3b31baf4d3552410170ea26c5c6535c41244f908f3aad22eccbbd3dcac02cb79e89f24fd53350a32b8e6c24f73187b41fbf4e131e30ced83ab18083
-
SSDEEP
1536:XQFl29mEkE0L1rDEKrxZKF2zf9g2Pl7W/MwbxMX+ees52z30rtrHuxzuK:429DkEGRQixVSjLaes5G30Bod
Malware Config
Signatures
-
Sakula payload 2 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula -
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 1972 MediaCenter.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 952 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
835e72ea7ba1ebf75a8fe65508d9d2d704d1118731930fa28c8df82153cddd11.exepid process 1404 835e72ea7ba1ebf75a8fe65508d9d2d704d1118731930fa28c8df82153cddd11.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
835e72ea7ba1ebf75a8fe65508d9d2d704d1118731930fa28c8df82153cddd11.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 835e72ea7ba1ebf75a8fe65508d9d2d704d1118731930fa28c8df82153cddd11.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
835e72ea7ba1ebf75a8fe65508d9d2d704d1118731930fa28c8df82153cddd11.exedescription pid process Token: SeIncBasePriorityPrivilege 1404 835e72ea7ba1ebf75a8fe65508d9d2d704d1118731930fa28c8df82153cddd11.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
835e72ea7ba1ebf75a8fe65508d9d2d704d1118731930fa28c8df82153cddd11.execmd.exedescription pid process target process PID 1404 wrote to memory of 1972 1404 835e72ea7ba1ebf75a8fe65508d9d2d704d1118731930fa28c8df82153cddd11.exe MediaCenter.exe PID 1404 wrote to memory of 1972 1404 835e72ea7ba1ebf75a8fe65508d9d2d704d1118731930fa28c8df82153cddd11.exe MediaCenter.exe PID 1404 wrote to memory of 1972 1404 835e72ea7ba1ebf75a8fe65508d9d2d704d1118731930fa28c8df82153cddd11.exe MediaCenter.exe PID 1404 wrote to memory of 1972 1404 835e72ea7ba1ebf75a8fe65508d9d2d704d1118731930fa28c8df82153cddd11.exe MediaCenter.exe PID 1404 wrote to memory of 952 1404 835e72ea7ba1ebf75a8fe65508d9d2d704d1118731930fa28c8df82153cddd11.exe cmd.exe PID 1404 wrote to memory of 952 1404 835e72ea7ba1ebf75a8fe65508d9d2d704d1118731930fa28c8df82153cddd11.exe cmd.exe PID 1404 wrote to memory of 952 1404 835e72ea7ba1ebf75a8fe65508d9d2d704d1118731930fa28c8df82153cddd11.exe cmd.exe PID 1404 wrote to memory of 952 1404 835e72ea7ba1ebf75a8fe65508d9d2d704d1118731930fa28c8df82153cddd11.exe cmd.exe PID 952 wrote to memory of 976 952 cmd.exe PING.EXE PID 952 wrote to memory of 976 952 cmd.exe PING.EXE PID 952 wrote to memory of 976 952 cmd.exe PING.EXE PID 952 wrote to memory of 976 952 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\835e72ea7ba1ebf75a8fe65508d9d2d704d1118731930fa28c8df82153cddd11.exe"C:\Users\Admin\AppData\Local\Temp\835e72ea7ba1ebf75a8fe65508d9d2d704d1118731930fa28c8df82153cddd11.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:1972
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\835e72ea7ba1ebf75a8fe65508d9d2d704d1118731930fa28c8df82153cddd11.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:976
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98KB
MD5e79c0ac54d9a00a4d7d3922189be8ba8
SHA134c70b9bfc8e38f72d9199269ed25a03528af3ca
SHA2568dbd4096bfdde2b7d4a68bae8fc5be6ef35919370ed4d2234755b92c28b476e0
SHA5122e53d02b72fe8da4aace93de5dd9fecaead6cbec081b2259f5241eb11e28525e707c309586cda6be3db46a52c521dc41b16e85d1aea945a6081d49df864e8424
-
Filesize
98KB
MD5e79c0ac54d9a00a4d7d3922189be8ba8
SHA134c70b9bfc8e38f72d9199269ed25a03528af3ca
SHA2568dbd4096bfdde2b7d4a68bae8fc5be6ef35919370ed4d2234755b92c28b476e0
SHA5122e53d02b72fe8da4aace93de5dd9fecaead6cbec081b2259f5241eb11e28525e707c309586cda6be3db46a52c521dc41b16e85d1aea945a6081d49df864e8424