Analysis
-
max time kernel
142s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
09-09-2023 13:16
Static task
static1
Behavioral task
behavioral1
Sample
2a7a4068e1a2d11db35bb3fd15a15211_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2a7a4068e1a2d11db35bb3fd15a15211_JC.exe
Resource
win10v2004-20230831-en
General
-
Target
2a7a4068e1a2d11db35bb3fd15a15211_JC.exe
-
Size
35KB
-
MD5
2a7a4068e1a2d11db35bb3fd15a15211
-
SHA1
085c13384357bef2980481584fa6082a9404016f
-
SHA256
253229a4819d39e944dc993871b92884fc8a41970e329056cc2e54e9d644792f
-
SHA512
1ec35d05b5b2790248f8784386700beb6060d75df966e3a919880d2df4c3e23dc80585f0af900376e580938ae2b3d01f176735ddbf4a023281320500a8c3ae09
-
SSDEEP
768:lwbYGCv4nuEcJpQK4TQbtKvXwXgA9lJJea+yGCJQqeWnAEv2647D7:lwbYP4nuEApQK4TQbtY2gA9DX+ytBO5
Malware Config
Signatures
-
Sakula payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/712-6-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula behavioral2/memory/2984-8-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula behavioral2/memory/712-13-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula behavioral2/memory/2984-18-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
2a7a4068e1a2d11db35bb3fd15a15211_JC.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000\Control Panel\International\Geo\Nation 2a7a4068e1a2d11db35bb3fd15a15211_JC.exe -
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 2984 MediaCenter.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
2a7a4068e1a2d11db35bb3fd15a15211_JC.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 2a7a4068e1a2d11db35bb3fd15a15211_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
2a7a4068e1a2d11db35bb3fd15a15211_JC.exedescription pid process Token: SeIncBasePriorityPrivilege 712 2a7a4068e1a2d11db35bb3fd15a15211_JC.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
2a7a4068e1a2d11db35bb3fd15a15211_JC.execmd.exedescription pid process target process PID 712 wrote to memory of 2984 712 2a7a4068e1a2d11db35bb3fd15a15211_JC.exe MediaCenter.exe PID 712 wrote to memory of 2984 712 2a7a4068e1a2d11db35bb3fd15a15211_JC.exe MediaCenter.exe PID 712 wrote to memory of 2984 712 2a7a4068e1a2d11db35bb3fd15a15211_JC.exe MediaCenter.exe PID 712 wrote to memory of 988 712 2a7a4068e1a2d11db35bb3fd15a15211_JC.exe cmd.exe PID 712 wrote to memory of 988 712 2a7a4068e1a2d11db35bb3fd15a15211_JC.exe cmd.exe PID 712 wrote to memory of 988 712 2a7a4068e1a2d11db35bb3fd15a15211_JC.exe cmd.exe PID 988 wrote to memory of 4408 988 cmd.exe PING.EXE PID 988 wrote to memory of 4408 988 cmd.exe PING.EXE PID 988 wrote to memory of 4408 988 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a7a4068e1a2d11db35bb3fd15a15211_JC.exe"C:\Users\Admin\AppData\Local\Temp\2a7a4068e1a2d11db35bb3fd15a15211_JC.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:712 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:2984 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\2a7a4068e1a2d11db35bb3fd15a15211_JC.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:4408
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD5e46719492dd78f4e532391b68205da92
SHA18d7c1bc043dbbb62e2da6b1f9b25e6a27a9a0e23
SHA256d2eb5058d16286407d21f1fee41b7da5ddd97db91c8d0b1541aa1df4aa1d142a
SHA512bb27452cb32919a354ec11f48f920de3f83708940b1fa6af19fde2a57d824427b9a84d8323178210996916fb4eb8b76a2bc7f8a9b6e8d0f9868cf13428c85a58
-
Filesize
35KB
MD5e46719492dd78f4e532391b68205da92
SHA18d7c1bc043dbbb62e2da6b1f9b25e6a27a9a0e23
SHA256d2eb5058d16286407d21f1fee41b7da5ddd97db91c8d0b1541aa1df4aa1d142a
SHA512bb27452cb32919a354ec11f48f920de3f83708940b1fa6af19fde2a57d824427b9a84d8323178210996916fb4eb8b76a2bc7f8a9b6e8d0f9868cf13428c85a58