Analysis
-
max time kernel
143s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
07-08-2023 13:22
Behavioral task
behavioral1
Sample
02f68925669ee7937e4d40c45522a647cad0d84bf82de94682fa1957785e66f7.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
02f68925669ee7937e4d40c45522a647cad0d84bf82de94682fa1957785e66f7.exe
Resource
win10v2004-20230703-en
General
-
Target
02f68925669ee7937e4d40c45522a647cad0d84bf82de94682fa1957785e66f7.exe
-
Size
5.2MB
-
MD5
82a801529478f463148878aecba8f75b
-
SHA1
dc31ca34d15ecf84a1d3d16560089d382237cfbe
-
SHA256
02f68925669ee7937e4d40c45522a647cad0d84bf82de94682fa1957785e66f7
-
SHA512
e3bfcaa4f51704999e8bdad911babbff141f89f1ab15abb0ae6d06612527df630c821d68e87c652db76d6b62d365edda61d3f1a9ef7589905013d8b877a7e3c1
-
SSDEEP
6144:H29qRfVSnt30Bbt+IhDFAT/HAkJtkJxkJ5kJekJXkJuJ6kJuJZkJuJvkJuJmkJuG:TRfQnA+2m18i
Malware Config
Extracted
sakula
www.polarroute.com
Signatures
-
Sakula payload 6 IoCs
resource yara_rule behavioral2/memory/3200-133-0x0000000000970000-0x0000000000ED0000-memory.dmp family_sakula behavioral2/files/0x0007000000023260-137.dat family_sakula behavioral2/files/0x0007000000023260-136.dat family_sakula behavioral2/memory/4844-138-0x00000000009D0000-0x0000000000F30000-memory.dmp family_sakula behavioral2/memory/4844-139-0x00000000009D0000-0x0000000000F30000-memory.dmp family_sakula behavioral2/memory/3200-140-0x0000000000970000-0x0000000000ED0000-memory.dmp family_sakula -
Executes dropped EXE 1 IoCs
pid Process 4844 MediaCenter.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 02f68925669ee7937e4d40c45522a647cad0d84bf82de94682fa1957785e66f7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2736 4844 WerFault.exe 81 -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2064 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3200 02f68925669ee7937e4d40c45522a647cad0d84bf82de94682fa1957785e66f7.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3200 wrote to memory of 4844 3200 02f68925669ee7937e4d40c45522a647cad0d84bf82de94682fa1957785e66f7.exe 81 PID 3200 wrote to memory of 4844 3200 02f68925669ee7937e4d40c45522a647cad0d84bf82de94682fa1957785e66f7.exe 81 PID 3200 wrote to memory of 4844 3200 02f68925669ee7937e4d40c45522a647cad0d84bf82de94682fa1957785e66f7.exe 81 PID 3200 wrote to memory of 3800 3200 02f68925669ee7937e4d40c45522a647cad0d84bf82de94682fa1957785e66f7.exe 86 PID 3200 wrote to memory of 3800 3200 02f68925669ee7937e4d40c45522a647cad0d84bf82de94682fa1957785e66f7.exe 86 PID 3200 wrote to memory of 3800 3200 02f68925669ee7937e4d40c45522a647cad0d84bf82de94682fa1957785e66f7.exe 86 PID 3800 wrote to memory of 2064 3800 cmd.exe 88 PID 3800 wrote to memory of 2064 3800 cmd.exe 88 PID 3800 wrote to memory of 2064 3800 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\02f68925669ee7937e4d40c45522a647cad0d84bf82de94682fa1957785e66f7.exe"C:\Users\Admin\AppData\Local\Temp\02f68925669ee7937e4d40c45522a647cad0d84bf82de94682fa1957785e66f7.exe"1⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:4844 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4844 -s 2123⤵
- Program crash
PID:2736
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\02f68925669ee7937e4d40c45522a647cad0d84bf82de94682fa1957785e66f7.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:2064
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4844 -ip 48441⤵PID:396
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.2MB
MD5d19370c7871958fc67651ce45f2612bc
SHA10192d761d7db9528b071ab404dd65c76ece06b44
SHA256ed0642bcb739ab0bc03fa4dedbb3e32590f5d5dc4235f82308d2edb35443d903
SHA512dd53aff72c6a9e2c17c58455b0bd5fcd8551b9566e80327448bd493b3748813489489e33bd0b68f3cb4cb96d8ec066f80410e680c4081c25df9bb06eba703887
-
Filesize
5.2MB
MD5d19370c7871958fc67651ce45f2612bc
SHA10192d761d7db9528b071ab404dd65c76ece06b44
SHA256ed0642bcb739ab0bc03fa4dedbb3e32590f5d5dc4235f82308d2edb35443d903
SHA512dd53aff72c6a9e2c17c58455b0bd5fcd8551b9566e80327448bd493b3748813489489e33bd0b68f3cb4cb96d8ec066f80410e680c4081c25df9bb06eba703887