Analysis
-
max time kernel
9s -
max time network
9s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
07-08-2023 09:23
Behavioral task
behavioral1
Sample
56146eaf36e94f63c3aa267da50b966c977e697219df6e6bbab96591c0531a8d.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
56146eaf36e94f63c3aa267da50b966c977e697219df6e6bbab96591c0531a8d.exe
Resource
win10v2004-20230703-en
General
-
Target
56146eaf36e94f63c3aa267da50b966c977e697219df6e6bbab96591c0531a8d.exe
-
Size
4.2MB
-
MD5
6bb5ca02a0d6ddaf5466da634523d810
-
SHA1
60cf5acfc85682d9c9c923de48a969b4bbe74b71
-
SHA256
56146eaf36e94f63c3aa267da50b966c977e697219df6e6bbab96591c0531a8d
-
SHA512
711f4a776f7906ded65b4a51f0378c5bb20b7cabf8dd0275b6595ed306904d761d3361a297184b826c4257f20effee398416fce669ebe7bb6ae68f013b8c14ab
-
SSDEEP
6144:N29qRfVSndj30Bk+7D2q49FZvV7RWJJWJQWJnWJfWJIWJAJN1WJAJcWJAJxWJAJM:FRfQntCX9
Malware Config
Extracted
sakula
www.polarroute.com
Signatures
-
Sakula payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2468-55-0x0000000000400000-0x0000000000853000-memory.dmp family_sakula C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula -
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 1604 MediaCenter.exe -
Loads dropped DLL 1 IoCs
Processes:
56146eaf36e94f63c3aa267da50b966c977e697219df6e6bbab96591c0531a8d.exepid process 2468 56146eaf36e94f63c3aa267da50b966c977e697219df6e6bbab96591c0531a8d.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
56146eaf36e94f63c3aa267da50b966c977e697219df6e6bbab96591c0531a8d.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 56146eaf36e94f63c3aa267da50b966c977e697219df6e6bbab96591c0531a8d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
56146eaf36e94f63c3aa267da50b966c977e697219df6e6bbab96591c0531a8d.exedescription pid process Token: SeIncBasePriorityPrivilege 2468 56146eaf36e94f63c3aa267da50b966c977e697219df6e6bbab96591c0531a8d.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
56146eaf36e94f63c3aa267da50b966c977e697219df6e6bbab96591c0531a8d.exedescription pid process target process PID 2468 wrote to memory of 1604 2468 56146eaf36e94f63c3aa267da50b966c977e697219df6e6bbab96591c0531a8d.exe MediaCenter.exe PID 2468 wrote to memory of 1604 2468 56146eaf36e94f63c3aa267da50b966c977e697219df6e6bbab96591c0531a8d.exe MediaCenter.exe PID 2468 wrote to memory of 1604 2468 56146eaf36e94f63c3aa267da50b966c977e697219df6e6bbab96591c0531a8d.exe MediaCenter.exe PID 2468 wrote to memory of 1604 2468 56146eaf36e94f63c3aa267da50b966c977e697219df6e6bbab96591c0531a8d.exe MediaCenter.exe PID 2468 wrote to memory of 1824 2468 56146eaf36e94f63c3aa267da50b966c977e697219df6e6bbab96591c0531a8d.exe cmd.exe PID 2468 wrote to memory of 1824 2468 56146eaf36e94f63c3aa267da50b966c977e697219df6e6bbab96591c0531a8d.exe cmd.exe PID 2468 wrote to memory of 1824 2468 56146eaf36e94f63c3aa267da50b966c977e697219df6e6bbab96591c0531a8d.exe cmd.exe PID 2468 wrote to memory of 1824 2468 56146eaf36e94f63c3aa267da50b966c977e697219df6e6bbab96591c0531a8d.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\56146eaf36e94f63c3aa267da50b966c977e697219df6e6bbab96591c0531a8d.exe"C:\Users\Admin\AppData\Local\Temp\56146eaf36e94f63c3aa267da50b966c977e697219df6e6bbab96591c0531a8d.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:1604
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\56146eaf36e94f63c3aa267da50b966c977e697219df6e6bbab96591c0531a8d.exe"2⤵PID:1824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.2MB
MD5a449ddc0a61fa6ab1af0eca56427083b
SHA1a2f88e4a4275c4a10994511733743adbc293d6ee
SHA256c84fe08a15b5996a0b651a20782b3c2a91212b17b2a09fe086db459af406aca9
SHA5120a73e7e5157a33a9c84483f5cb8fbfea2477a261f3530691e2db648e6b7826d3ad76234153f1ce3b54207584ed915a6d14acc5344f824fa4528625fbdff605cb
-
Filesize
4.2MB
MD5a449ddc0a61fa6ab1af0eca56427083b
SHA1a2f88e4a4275c4a10994511733743adbc293d6ee
SHA256c84fe08a15b5996a0b651a20782b3c2a91212b17b2a09fe086db459af406aca9
SHA5120a73e7e5157a33a9c84483f5cb8fbfea2477a261f3530691e2db648e6b7826d3ad76234153f1ce3b54207584ed915a6d14acc5344f824fa4528625fbdff605cb