Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
07/08/2023, 13:22
Behavioral task
behavioral1
Sample
02f68925669ee7937e4d40c45522a647cad0d84bf82de94682fa1957785e66f7.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
02f68925669ee7937e4d40c45522a647cad0d84bf82de94682fa1957785e66f7.exe
Resource
win10v2004-20230703-en
General
-
Target
02f68925669ee7937e4d40c45522a647cad0d84bf82de94682fa1957785e66f7.exe
-
Size
5.2MB
-
MD5
82a801529478f463148878aecba8f75b
-
SHA1
dc31ca34d15ecf84a1d3d16560089d382237cfbe
-
SHA256
02f68925669ee7937e4d40c45522a647cad0d84bf82de94682fa1957785e66f7
-
SHA512
e3bfcaa4f51704999e8bdad911babbff141f89f1ab15abb0ae6d06612527df630c821d68e87c652db76d6b62d365edda61d3f1a9ef7589905013d8b877a7e3c1
-
SSDEEP
6144:H29qRfVSnt30Bbt+IhDFAT/HAkJtkJxkJ5kJekJXkJuJ6kJuJZkJuJvkJuJmkJuG:TRfQnA+2m18i
Malware Config
Extracted
sakula
www.polarroute.com
Signatures
-
Sakula payload 5 IoCs
resource yara_rule behavioral1/memory/2520-54-0x00000000012C0000-0x0000000001820000-memory.dmp family_sakula behavioral1/files/0x000d00000001227b-56.dat family_sakula behavioral1/files/0x000d00000001227b-59.dat family_sakula behavioral1/memory/840-60-0x0000000000020000-0x0000000000580000-memory.dmp family_sakula behavioral1/memory/2520-61-0x00000000012C0000-0x0000000001820000-memory.dmp family_sakula -
Deletes itself 1 IoCs
pid Process 604 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 840 MediaCenter.exe -
Loads dropped DLL 1 IoCs
pid Process 2520 02f68925669ee7937e4d40c45522a647cad0d84bf82de94682fa1957785e66f7.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 02f68925669ee7937e4d40c45522a647cad0d84bf82de94682fa1957785e66f7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2168 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2520 02f68925669ee7937e4d40c45522a647cad0d84bf82de94682fa1957785e66f7.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2520 wrote to memory of 840 2520 02f68925669ee7937e4d40c45522a647cad0d84bf82de94682fa1957785e66f7.exe 28 PID 2520 wrote to memory of 840 2520 02f68925669ee7937e4d40c45522a647cad0d84bf82de94682fa1957785e66f7.exe 28 PID 2520 wrote to memory of 840 2520 02f68925669ee7937e4d40c45522a647cad0d84bf82de94682fa1957785e66f7.exe 28 PID 2520 wrote to memory of 840 2520 02f68925669ee7937e4d40c45522a647cad0d84bf82de94682fa1957785e66f7.exe 28 PID 2520 wrote to memory of 604 2520 02f68925669ee7937e4d40c45522a647cad0d84bf82de94682fa1957785e66f7.exe 30 PID 2520 wrote to memory of 604 2520 02f68925669ee7937e4d40c45522a647cad0d84bf82de94682fa1957785e66f7.exe 30 PID 2520 wrote to memory of 604 2520 02f68925669ee7937e4d40c45522a647cad0d84bf82de94682fa1957785e66f7.exe 30 PID 2520 wrote to memory of 604 2520 02f68925669ee7937e4d40c45522a647cad0d84bf82de94682fa1957785e66f7.exe 30 PID 604 wrote to memory of 2168 604 cmd.exe 33 PID 604 wrote to memory of 2168 604 cmd.exe 33 PID 604 wrote to memory of 2168 604 cmd.exe 33 PID 604 wrote to memory of 2168 604 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\02f68925669ee7937e4d40c45522a647cad0d84bf82de94682fa1957785e66f7.exe"C:\Users\Admin\AppData\Local\Temp\02f68925669ee7937e4d40c45522a647cad0d84bf82de94682fa1957785e66f7.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:840
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\02f68925669ee7937e4d40c45522a647cad0d84bf82de94682fa1957785e66f7.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:2168
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.2MB
MD5c26b6e5eede9dd45bc56e41ef10a906a
SHA18bf24b816703c169553b6a1a1fe5054e99c7df55
SHA256bb8c74d9611282671856a917cecf2cee1d835dca9da942ab2afc493cbd03b7ce
SHA512f8748d3f79ceb31fb0f6008f8cef391f9a0dae5e76844016c42bb5e9f2e30978e3b4e834111158a102fa2088b217a5e6349032ca52fbf1fecd821bbf2688e525
-
Filesize
5.2MB
MD5c26b6e5eede9dd45bc56e41ef10a906a
SHA18bf24b816703c169553b6a1a1fe5054e99c7df55
SHA256bb8c74d9611282671856a917cecf2cee1d835dca9da942ab2afc493cbd03b7ce
SHA512f8748d3f79ceb31fb0f6008f8cef391f9a0dae5e76844016c42bb5e9f2e30978e3b4e834111158a102fa2088b217a5e6349032ca52fbf1fecd821bbf2688e525