Analysis
-
max time kernel
152s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
04-07-2023 15:16
Behavioral task
behavioral1
Sample
easy_Malicious_04f2c26a27bcd27c510583fc16a566bab40ba76c3c573f065439ec0794934339.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
easy_Malicious_04f2c26a27bcd27c510583fc16a566bab40ba76c3c573f065439ec0794934339.exe
Resource
win10v2004-20230703-en
General
-
Target
easy_Malicious_04f2c26a27bcd27c510583fc16a566bab40ba76c3c573f065439ec0794934339.exe
-
Size
418KB
-
MD5
1ab5eb4a17127c6b5e4ae15a8757737c
-
SHA1
e3a9ef10f4badc0904f8be060945c5fab383ac49
-
SHA256
f3f4e690f55d8246bbb2c456dba2b551fa77ecedf273b83480f2e0f37f1219c0
-
SHA512
ebe284500429696a15351ee24be0683a1a0380d0cd9298504f2ef363cc94d31bbbe65721d47b04801a1319d4114497240acd7747415e41d1cc4c42669ccb0f2a
-
SSDEEP
6144:M29qRfVSndj30B3wBxE1+ijiBKk3etdgI2MyzNORQtOfl1qNVo7R+S+N/TU7kn5f:0RfQn+w8EYiBlMkn5f9J105i
Malware Config
Extracted
sakula
www.polarroute.com
Signatures
-
Sakula payload 6 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula behavioral2/memory/3312-137-0x0000000000400000-0x0000000000420000-memory.dmp family_sakula behavioral2/memory/944-138-0x0000000000400000-0x0000000000420000-memory.dmp family_sakula behavioral2/memory/3312-146-0x0000000000400000-0x0000000000420000-memory.dmp family_sakula behavioral2/memory/944-147-0x0000000000400000-0x0000000000420000-memory.dmp family_sakula -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
easy_Malicious_04f2c26a27bcd27c510583fc16a566bab40ba76c3c573f065439ec0794934339.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\Control Panel\International\Geo\Nation easy_Malicious_04f2c26a27bcd27c510583fc16a566bab40ba76c3c573f065439ec0794934339.exe -
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 944 MediaCenter.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
easy_Malicious_04f2c26a27bcd27c510583fc16a566bab40ba76c3c573f065439ec0794934339.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" easy_Malicious_04f2c26a27bcd27c510583fc16a566bab40ba76c3c573f065439ec0794934339.exe -
Drops file in System32 directory 1 IoCs
Processes:
svchost.exedescription ioc process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{3A16541B-592A-44BA-B3D3-26C447A162C7}.catalogItem svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
svchost.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
svchost.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
easy_Malicious_04f2c26a27bcd27c510583fc16a566bab40ba76c3c573f065439ec0794934339.exedescription pid process Token: SeIncBasePriorityPrivilege 3312 easy_Malicious_04f2c26a27bcd27c510583fc16a566bab40ba76c3c573f065439ec0794934339.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
easy_Malicious_04f2c26a27bcd27c510583fc16a566bab40ba76c3c573f065439ec0794934339.execmd.exedescription pid process target process PID 3312 wrote to memory of 944 3312 easy_Malicious_04f2c26a27bcd27c510583fc16a566bab40ba76c3c573f065439ec0794934339.exe MediaCenter.exe PID 3312 wrote to memory of 944 3312 easy_Malicious_04f2c26a27bcd27c510583fc16a566bab40ba76c3c573f065439ec0794934339.exe MediaCenter.exe PID 3312 wrote to memory of 944 3312 easy_Malicious_04f2c26a27bcd27c510583fc16a566bab40ba76c3c573f065439ec0794934339.exe MediaCenter.exe PID 3312 wrote to memory of 2964 3312 easy_Malicious_04f2c26a27bcd27c510583fc16a566bab40ba76c3c573f065439ec0794934339.exe cmd.exe PID 3312 wrote to memory of 2964 3312 easy_Malicious_04f2c26a27bcd27c510583fc16a566bab40ba76c3c573f065439ec0794934339.exe cmd.exe PID 3312 wrote to memory of 2964 3312 easy_Malicious_04f2c26a27bcd27c510583fc16a566bab40ba76c3c573f065439ec0794934339.exe cmd.exe PID 2964 wrote to memory of 4160 2964 cmd.exe PING.EXE PID 2964 wrote to memory of 4160 2964 cmd.exe PING.EXE PID 2964 wrote to memory of 4160 2964 cmd.exe PING.EXE -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\easy_Malicious_04f2c26a27bcd27c510583fc16a566bab40ba76c3c573f065439ec0794934339.exe"C:\Users\Admin\AppData\Local\Temp\easy_Malicious_04f2c26a27bcd27c510583fc16a566bab40ba76c3c573f065439ec0794934339.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:944 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\easy_Malicious_04f2c26a27bcd27c510583fc16a566bab40ba76c3c573f065439ec0794934339.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:4160
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
PID:4448
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\1Y0EG8YX\zauzggqc1875874068[1].htmFilesize
2KB
MD53ac1fc7278c765add6f2269379304bfb
SHA1c3236a35a4dc17b01e1149509366ad4130a52c99
SHA256af9c53bac5e14a69633b395f7477afda25406901cf2c14d9e3aea0aa41060515
SHA51233481a9019f54481e81d802694dda986632e11f55784c657b0440ade5e95e7c61fa338731337aaa4e088fd101ddacbb182e9b1b97d7eca1e0fde2331094d9ed9
-
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeFilesize
418KB
MD59d53e8d8116c437c52870567367b7c94
SHA100468cf9596fdc66f1a7d568efc41ace09b4c4ef
SHA2569e8a54d25952cf926f4e54b893ee61a7bc65e3d17020705b3b6bdd62331bd31a
SHA512c580a38cef850be4b3870d1cb40310a72382193630233a391cdbe74a68a749c147a27059e7aef494ac07bca54dd920c359205bf8ec402fa69ebcef182bae1d6b
-
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeFilesize
418KB
MD59d53e8d8116c437c52870567367b7c94
SHA100468cf9596fdc66f1a7d568efc41ace09b4c4ef
SHA2569e8a54d25952cf926f4e54b893ee61a7bc65e3d17020705b3b6bdd62331bd31a
SHA512c580a38cef850be4b3870d1cb40310a72382193630233a391cdbe74a68a749c147a27059e7aef494ac07bca54dd920c359205bf8ec402fa69ebcef182bae1d6b
-
memory/944-138-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/944-147-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/3312-137-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/3312-146-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB