Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
09-08-2023 13:53
Behavioral task
behavioral1
Sample
2feda3b406e459fa22da191c9bd2593f6476bb52167895eae4b4be82b6d0540c.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
2feda3b406e459fa22da191c9bd2593f6476bb52167895eae4b4be82b6d0540c.exe
Resource
win10v2004-20230703-en
General
-
Target
2feda3b406e459fa22da191c9bd2593f6476bb52167895eae4b4be82b6d0540c.exe
-
Size
101KB
-
MD5
31e86a3424261ddb573e49f4756bd004
-
SHA1
d90510ce9f324cf02be72002db685421af3c437d
-
SHA256
2feda3b406e459fa22da191c9bd2593f6476bb52167895eae4b4be82b6d0540c
-
SHA512
4e27b5009708d12cf72b42476e1b0101eb706c6784212872ffc70a70cb09364b45a3ba921c8eaf0ebd6d417460a08fa69695711efc7c13fadfa390565ae112af
-
SSDEEP
1536:0oaj1hJL1S9t0MIeboal8bCKxo7h0RP0IwHNz30rtroGCr2:P0hpgz6xGhTIwHF30BENr2
Malware Config
Signatures
-
Sakula payload 9 IoCs
Processes:
resource yara_rule behavioral1/memory/1944-54-0x0000000001040000-0x000000000105B000-memory.dmp family_sakula C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula behavioral1/memory/2112-65-0x00000000011B0000-0x00000000011CB000-memory.dmp family_sakula C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula behavioral1/memory/1944-58-0x00000000000E0000-0x00000000000FB000-memory.dmp family_sakula \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe family_sakula behavioral1/memory/1944-66-0x0000000001040000-0x000000000105B000-memory.dmp family_sakula behavioral1/memory/2112-67-0x00000000011B0000-0x00000000011CB000-memory.dmp family_sakula -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1080 cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 2112 MediaCenter.exe -
Loads dropped DLL 2 IoCs
Processes:
2feda3b406e459fa22da191c9bd2593f6476bb52167895eae4b4be82b6d0540c.exepid process 1944 2feda3b406e459fa22da191c9bd2593f6476bb52167895eae4b4be82b6d0540c.exe 1944 2feda3b406e459fa22da191c9bd2593f6476bb52167895eae4b4be82b6d0540c.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
2feda3b406e459fa22da191c9bd2593f6476bb52167895eae4b4be82b6d0540c.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 2feda3b406e459fa22da191c9bd2593f6476bb52167895eae4b4be82b6d0540c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
2feda3b406e459fa22da191c9bd2593f6476bb52167895eae4b4be82b6d0540c.exedescription pid process Token: SeIncBasePriorityPrivilege 1944 2feda3b406e459fa22da191c9bd2593f6476bb52167895eae4b4be82b6d0540c.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
2feda3b406e459fa22da191c9bd2593f6476bb52167895eae4b4be82b6d0540c.execmd.exedescription pid process target process PID 1944 wrote to memory of 2112 1944 2feda3b406e459fa22da191c9bd2593f6476bb52167895eae4b4be82b6d0540c.exe MediaCenter.exe PID 1944 wrote to memory of 2112 1944 2feda3b406e459fa22da191c9bd2593f6476bb52167895eae4b4be82b6d0540c.exe MediaCenter.exe PID 1944 wrote to memory of 2112 1944 2feda3b406e459fa22da191c9bd2593f6476bb52167895eae4b4be82b6d0540c.exe MediaCenter.exe PID 1944 wrote to memory of 2112 1944 2feda3b406e459fa22da191c9bd2593f6476bb52167895eae4b4be82b6d0540c.exe MediaCenter.exe PID 1944 wrote to memory of 1080 1944 2feda3b406e459fa22da191c9bd2593f6476bb52167895eae4b4be82b6d0540c.exe cmd.exe PID 1944 wrote to memory of 1080 1944 2feda3b406e459fa22da191c9bd2593f6476bb52167895eae4b4be82b6d0540c.exe cmd.exe PID 1944 wrote to memory of 1080 1944 2feda3b406e459fa22da191c9bd2593f6476bb52167895eae4b4be82b6d0540c.exe cmd.exe PID 1944 wrote to memory of 1080 1944 2feda3b406e459fa22da191c9bd2593f6476bb52167895eae4b4be82b6d0540c.exe cmd.exe PID 1080 wrote to memory of 2072 1080 cmd.exe PING.EXE PID 1080 wrote to memory of 2072 1080 cmd.exe PING.EXE PID 1080 wrote to memory of 2072 1080 cmd.exe PING.EXE PID 1080 wrote to memory of 2072 1080 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\2feda3b406e459fa22da191c9bd2593f6476bb52167895eae4b4be82b6d0540c.exe"C:\Users\Admin\AppData\Local\Temp\2feda3b406e459fa22da191c9bd2593f6476bb52167895eae4b4be82b6d0540c.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\2feda3b406e459fa22da191c9bd2593f6476bb52167895eae4b4be82b6d0540c.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeFilesize
101KB
MD522d8c8c921c33b8ebfb05b9a1a3da532
SHA18e80586528144f195cf8e884b7818e804400e154
SHA2560fca4a2ef7c0197fb2cc78d48149d77f586fa47a8901aa3fed3a6ac5d85d7277
SHA512d712f4c9f7cf1015290279536037ffef2552a79b429da7db5ac17142f6910d2de0400b695de56b6d6eabb245d4211ddca6bfef96579e5ff56942c726362d0166
-
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeFilesize
101KB
MD522d8c8c921c33b8ebfb05b9a1a3da532
SHA18e80586528144f195cf8e884b7818e804400e154
SHA2560fca4a2ef7c0197fb2cc78d48149d77f586fa47a8901aa3fed3a6ac5d85d7277
SHA512d712f4c9f7cf1015290279536037ffef2552a79b429da7db5ac17142f6910d2de0400b695de56b6d6eabb245d4211ddca6bfef96579e5ff56942c726362d0166
-
\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeFilesize
101KB
MD522d8c8c921c33b8ebfb05b9a1a3da532
SHA18e80586528144f195cf8e884b7818e804400e154
SHA2560fca4a2ef7c0197fb2cc78d48149d77f586fa47a8901aa3fed3a6ac5d85d7277
SHA512d712f4c9f7cf1015290279536037ffef2552a79b429da7db5ac17142f6910d2de0400b695de56b6d6eabb245d4211ddca6bfef96579e5ff56942c726362d0166
-
\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeFilesize
101KB
MD522d8c8c921c33b8ebfb05b9a1a3da532
SHA18e80586528144f195cf8e884b7818e804400e154
SHA2560fca4a2ef7c0197fb2cc78d48149d77f586fa47a8901aa3fed3a6ac5d85d7277
SHA512d712f4c9f7cf1015290279536037ffef2552a79b429da7db5ac17142f6910d2de0400b695de56b6d6eabb245d4211ddca6bfef96579e5ff56942c726362d0166
-
memory/1944-54-0x0000000001040000-0x000000000105B000-memory.dmpFilesize
108KB
-
memory/1944-63-0x00000000000E0000-0x00000000000FB000-memory.dmpFilesize
108KB
-
memory/1944-58-0x00000000000E0000-0x00000000000FB000-memory.dmpFilesize
108KB
-
memory/1944-66-0x0000000001040000-0x000000000105B000-memory.dmpFilesize
108KB
-
memory/2112-65-0x00000000011B0000-0x00000000011CB000-memory.dmpFilesize
108KB
-
memory/2112-67-0x00000000011B0000-0x00000000011CB000-memory.dmpFilesize
108KB