Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
04-07-2023 16:09
Behavioral task
behavioral1
Sample
easyMalicious04f2c26a27bc.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
easyMalicious04f2c26a27bc.exe
Resource
win10v2004-20230703-en
General
-
Target
easyMalicious04f2c26a27bc.exe
-
Size
418KB
-
MD5
1ab5eb4a17127c6b5e4ae15a8757737c
-
SHA1
e3a9ef10f4badc0904f8be060945c5fab383ac49
-
SHA256
f3f4e690f55d8246bbb2c456dba2b551fa77ecedf273b83480f2e0f37f1219c0
-
SHA512
ebe284500429696a15351ee24be0683a1a0380d0cd9298504f2ef363cc94d31bbbe65721d47b04801a1319d4114497240acd7747415e41d1cc4c42669ccb0f2a
-
SSDEEP
6144:M29qRfVSndj30B3wBxE1+ijiBKk3etdgI2MyzNORQtOfl1qNVo7R+S+N/TU7kn5f:0RfQn+w8EYiBlMkn5f9J105i
Malware Config
Extracted
sakula
www.polarroute.com
Signatures
-
Sakula payload 6 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula behavioral1/memory/3004-59-0x0000000000400000-0x0000000000420000-memory.dmp family_sakula behavioral1/memory/3052-61-0x0000000000400000-0x0000000000420000-memory.dmp family_sakula behavioral1/memory/3004-62-0x0000000000400000-0x0000000000420000-memory.dmp family_sakula behavioral1/memory/3052-72-0x0000000000400000-0x0000000000420000-memory.dmp family_sakula -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2928 cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 3052 MediaCenter.exe -
Loads dropped DLL 1 IoCs
Processes:
easyMalicious04f2c26a27bc.exepid process 3004 easyMalicious04f2c26a27bc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
easyMalicious04f2c26a27bc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" easyMalicious04f2c26a27bc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
easyMalicious04f2c26a27bc.exedescription pid process Token: SeIncBasePriorityPrivilege 3004 easyMalicious04f2c26a27bc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
easyMalicious04f2c26a27bc.execmd.exedescription pid process target process PID 3004 wrote to memory of 3052 3004 easyMalicious04f2c26a27bc.exe MediaCenter.exe PID 3004 wrote to memory of 3052 3004 easyMalicious04f2c26a27bc.exe MediaCenter.exe PID 3004 wrote to memory of 3052 3004 easyMalicious04f2c26a27bc.exe MediaCenter.exe PID 3004 wrote to memory of 3052 3004 easyMalicious04f2c26a27bc.exe MediaCenter.exe PID 3004 wrote to memory of 2928 3004 easyMalicious04f2c26a27bc.exe cmd.exe PID 3004 wrote to memory of 2928 3004 easyMalicious04f2c26a27bc.exe cmd.exe PID 3004 wrote to memory of 2928 3004 easyMalicious04f2c26a27bc.exe cmd.exe PID 3004 wrote to memory of 2928 3004 easyMalicious04f2c26a27bc.exe cmd.exe PID 2928 wrote to memory of 1680 2928 cmd.exe PING.EXE PID 2928 wrote to memory of 1680 2928 cmd.exe PING.EXE PID 2928 wrote to memory of 1680 2928 cmd.exe PING.EXE PID 2928 wrote to memory of 1680 2928 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\easyMalicious04f2c26a27bc.exe"C:\Users\Admin\AppData\Local\Temp\easyMalicious04f2c26a27bc.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:3052
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\easyMalicious04f2c26a27bc.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1680
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
418KB
MD526b8e91734675be1926f92f730f45844
SHA10678065e7a12e09b92ff09a6a10a8f0b0fb772c1
SHA256b51e2284408380119f8333da602772269214260333a7925d1fcc9f02c8cf2ac7
SHA5121c7ae30aded8784c241ecabf129014f2a869c5496e201b7bb4908e2c21b34727acdff792a294fdea32aec830d30d2e52cecf6b2113bebedee23e8ddaac8f03d7
-
Filesize
418KB
MD526b8e91734675be1926f92f730f45844
SHA10678065e7a12e09b92ff09a6a10a8f0b0fb772c1
SHA256b51e2284408380119f8333da602772269214260333a7925d1fcc9f02c8cf2ac7
SHA5121c7ae30aded8784c241ecabf129014f2a869c5496e201b7bb4908e2c21b34727acdff792a294fdea32aec830d30d2e52cecf6b2113bebedee23e8ddaac8f03d7