Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
04-07-2023 16:09
Behavioral task
behavioral1
Sample
easyMalicious04f2c26a27bc.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
easyMalicious04f2c26a27bc.exe
Resource
win10v2004-20230703-en
General
-
Target
easyMalicious04f2c26a27bc.exe
-
Size
418KB
-
MD5
1ab5eb4a17127c6b5e4ae15a8757737c
-
SHA1
e3a9ef10f4badc0904f8be060945c5fab383ac49
-
SHA256
f3f4e690f55d8246bbb2c456dba2b551fa77ecedf273b83480f2e0f37f1219c0
-
SHA512
ebe284500429696a15351ee24be0683a1a0380d0cd9298504f2ef363cc94d31bbbe65721d47b04801a1319d4114497240acd7747415e41d1cc4c42669ccb0f2a
-
SSDEEP
6144:M29qRfVSndj30B3wBxE1+ijiBKk3etdgI2MyzNORQtOfl1qNVo7R+S+N/TU7kn5f:0RfQn+w8EYiBlMkn5f9J105i
Malware Config
Extracted
sakula
www.polarroute.com
Signatures
-
Sakula payload 6 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula behavioral2/memory/4556-137-0x0000000000400000-0x0000000000420000-memory.dmp family_sakula behavioral2/memory/4920-138-0x0000000000400000-0x0000000000420000-memory.dmp family_sakula behavioral2/memory/4556-139-0x0000000000400000-0x0000000000420000-memory.dmp family_sakula behavioral2/memory/4920-144-0x0000000000400000-0x0000000000420000-memory.dmp family_sakula -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
easyMalicious04f2c26a27bc.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\Control Panel\International\Geo\Nation easyMalicious04f2c26a27bc.exe -
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 4920 MediaCenter.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
easyMalicious04f2c26a27bc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" easyMalicious04f2c26a27bc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
easyMalicious04f2c26a27bc.exedescription pid process Token: SeIncBasePriorityPrivilege 4556 easyMalicious04f2c26a27bc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
easyMalicious04f2c26a27bc.execmd.exedescription pid process target process PID 4556 wrote to memory of 4920 4556 easyMalicious04f2c26a27bc.exe MediaCenter.exe PID 4556 wrote to memory of 4920 4556 easyMalicious04f2c26a27bc.exe MediaCenter.exe PID 4556 wrote to memory of 4920 4556 easyMalicious04f2c26a27bc.exe MediaCenter.exe PID 4556 wrote to memory of 2320 4556 easyMalicious04f2c26a27bc.exe cmd.exe PID 4556 wrote to memory of 2320 4556 easyMalicious04f2c26a27bc.exe cmd.exe PID 4556 wrote to memory of 2320 4556 easyMalicious04f2c26a27bc.exe cmd.exe PID 2320 wrote to memory of 4224 2320 cmd.exe PING.EXE PID 2320 wrote to memory of 4224 2320 cmd.exe PING.EXE PID 2320 wrote to memory of 4224 2320 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\easyMalicious04f2c26a27bc.exe"C:\Users\Admin\AppData\Local\Temp\easyMalicious04f2c26a27bc.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:4920
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\easyMalicious04f2c26a27bc.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:4224
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD53ac1fc7278c765add6f2269379304bfb
SHA1c3236a35a4dc17b01e1149509366ad4130a52c99
SHA256af9c53bac5e14a69633b395f7477afda25406901cf2c14d9e3aea0aa41060515
SHA51233481a9019f54481e81d802694dda986632e11f55784c657b0440ade5e95e7c61fa338731337aaa4e088fd101ddacbb182e9b1b97d7eca1e0fde2331094d9ed9
-
Filesize
418KB
MD53f132e43ac6243b08e43872a33ab42ce
SHA17b96e172caf5447bcde6394d3a18f8c0c0d24124
SHA2569906218eed7036fd4ef53456be165e24b6839b48fb81e4b5dfbe6d67ad0c9cd4
SHA5129d2549dd3e7becb8c8b4ac2561d70709ec7d60db1ddabdfc1fd8dab560d0dd6db416d54401f4e37da36178828d664f17c9d732322b9d7112f389033472a10204
-
Filesize
418KB
MD53f132e43ac6243b08e43872a33ab42ce
SHA17b96e172caf5447bcde6394d3a18f8c0c0d24124
SHA2569906218eed7036fd4ef53456be165e24b6839b48fb81e4b5dfbe6d67ad0c9cd4
SHA5129d2549dd3e7becb8c8b4ac2561d70709ec7d60db1ddabdfc1fd8dab560d0dd6db416d54401f4e37da36178828d664f17c9d732322b9d7112f389033472a10204