Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13-09-2023 17:57
Static task
static1
Behavioral task
behavioral1
Sample
cd64145da6ddb5857039ef96ca9b47d0_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
cd64145da6ddb5857039ef96ca9b47d0_JC.exe
Resource
win10v2004-20230831-en
General
-
Target
cd64145da6ddb5857039ef96ca9b47d0_JC.exe
-
Size
42KB
-
MD5
cd64145da6ddb5857039ef96ca9b47d0
-
SHA1
75917fb5294498f70f1472aaafab27a892e3e614
-
SHA256
4e64e96e5f49908f9bd44176dbdd2012e84bb6e7bde72af419ada7e8a17e303a
-
SHA512
ae2a4586d7881811031e441b1ee62ee7a6bc6bbf1e86679c6ef5b695969e7426f7a6d3fff244a8e6cbcb50e31adf1e8ed76947123f898c79634f6df987329be2
-
SSDEEP
768:/hSksandb4GgyMsp4hyYtoVxYGm1q+R9cFDBMm:/TsGpehyYtkYvYm9cHMm
Malware Config
Extracted
sakula
http://vpn.premrera.com:443/viewpre.asp?cstring=%s&tom=%d&id=%d
http://vpn.premrera.com:443/photo/%s.jpg?id=%d
http://173.254.226.212:443/viewpre.asp?cstring=%s&tom=%d&id=%d
http://173.254.226.212:443/photo/%s.jpg?id=%d
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2876 cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 2628 MediaCenter.exe -
Loads dropped DLL 2 IoCs
Processes:
cmd.exepid process 2580 cmd.exe 2580 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" reg.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
cd64145da6ddb5857039ef96ca9b47d0_JC.execmd.execmd.execmd.exedescription pid process target process PID 2180 wrote to memory of 1540 2180 cd64145da6ddb5857039ef96ca9b47d0_JC.exe cmd.exe PID 2180 wrote to memory of 1540 2180 cd64145da6ddb5857039ef96ca9b47d0_JC.exe cmd.exe PID 2180 wrote to memory of 1540 2180 cd64145da6ddb5857039ef96ca9b47d0_JC.exe cmd.exe PID 2180 wrote to memory of 1540 2180 cd64145da6ddb5857039ef96ca9b47d0_JC.exe cmd.exe PID 2180 wrote to memory of 2580 2180 cd64145da6ddb5857039ef96ca9b47d0_JC.exe cmd.exe PID 2180 wrote to memory of 2580 2180 cd64145da6ddb5857039ef96ca9b47d0_JC.exe cmd.exe PID 2180 wrote to memory of 2580 2180 cd64145da6ddb5857039ef96ca9b47d0_JC.exe cmd.exe PID 2180 wrote to memory of 2580 2180 cd64145da6ddb5857039ef96ca9b47d0_JC.exe cmd.exe PID 2180 wrote to memory of 2876 2180 cd64145da6ddb5857039ef96ca9b47d0_JC.exe cmd.exe PID 2180 wrote to memory of 2876 2180 cd64145da6ddb5857039ef96ca9b47d0_JC.exe cmd.exe PID 2180 wrote to memory of 2876 2180 cd64145da6ddb5857039ef96ca9b47d0_JC.exe cmd.exe PID 2180 wrote to memory of 2876 2180 cd64145da6ddb5857039ef96ca9b47d0_JC.exe cmd.exe PID 2580 wrote to memory of 2628 2580 cmd.exe MediaCenter.exe PID 2580 wrote to memory of 2628 2580 cmd.exe MediaCenter.exe PID 2580 wrote to memory of 2628 2580 cmd.exe MediaCenter.exe PID 2580 wrote to memory of 2628 2580 cmd.exe MediaCenter.exe PID 2876 wrote to memory of 2144 2876 cmd.exe PING.EXE PID 2876 wrote to memory of 2144 2876 cmd.exe PING.EXE PID 2876 wrote to memory of 2144 2876 cmd.exe PING.EXE PID 2876 wrote to memory of 2144 2876 cmd.exe PING.EXE PID 1540 wrote to memory of 3040 1540 cmd.exe reg.exe PID 1540 wrote to memory of 3040 1540 cmd.exe reg.exe PID 1540 wrote to memory of 3040 1540 cmd.exe reg.exe PID 1540 wrote to memory of 3040 1540 cmd.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd64145da6ddb5857039ef96ca9b47d0_JC.exe"C:\Users\Admin\AppData\Local\Temp\cd64145da6ddb5857039ef96ca9b47d0_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\cmd.execmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v "MicroMedia" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\SysWOW64\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v "MicroMedia" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"3⤵
- Adds Run key to start application
- Modifies registry key
PID:3040
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe3⤵
- Executes dropped EXE
PID:2628
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ping 127.0.0.1 & del "C:\Users\Admin\AppData\Local\Temp\cd64145da6ddb5857039ef96ca9b47d0_JC.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:2144
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD5429de7385ade1c5a6764319b2066facb
SHA1d5d12d6a8fc519cbda2183150b0b48d207938a39
SHA256be3418374af3958c4fec7b569d618c175ec7ee85eb2b99406fe190f947a15c7b
SHA5124173da222f62e5b1d57fb322e08f29ba2bf68ce6846235ad1db011e5d8e0f96d20582992d7aedb614b91f857d3a086bb25dfd3fb56c0ee3d05b7fec72051ff07
-
Filesize
42KB
MD5429de7385ade1c5a6764319b2066facb
SHA1d5d12d6a8fc519cbda2183150b0b48d207938a39
SHA256be3418374af3958c4fec7b569d618c175ec7ee85eb2b99406fe190f947a15c7b
SHA5124173da222f62e5b1d57fb322e08f29ba2bf68ce6846235ad1db011e5d8e0f96d20582992d7aedb614b91f857d3a086bb25dfd3fb56c0ee3d05b7fec72051ff07
-
Filesize
42KB
MD5429de7385ade1c5a6764319b2066facb
SHA1d5d12d6a8fc519cbda2183150b0b48d207938a39
SHA256be3418374af3958c4fec7b569d618c175ec7ee85eb2b99406fe190f947a15c7b
SHA5124173da222f62e5b1d57fb322e08f29ba2bf68ce6846235ad1db011e5d8e0f96d20582992d7aedb614b91f857d3a086bb25dfd3fb56c0ee3d05b7fec72051ff07
-
Filesize
42KB
MD5429de7385ade1c5a6764319b2066facb
SHA1d5d12d6a8fc519cbda2183150b0b48d207938a39
SHA256be3418374af3958c4fec7b569d618c175ec7ee85eb2b99406fe190f947a15c7b
SHA5124173da222f62e5b1d57fb322e08f29ba2bf68ce6846235ad1db011e5d8e0f96d20582992d7aedb614b91f857d3a086bb25dfd3fb56c0ee3d05b7fec72051ff07