Analysis

  • max time kernel
    142s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230831-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-09-2023 17:57

General

  • Target

    cd64145da6ddb5857039ef96ca9b47d0_JC.exe

  • Size

    42KB

  • MD5

    cd64145da6ddb5857039ef96ca9b47d0

  • SHA1

    75917fb5294498f70f1472aaafab27a892e3e614

  • SHA256

    4e64e96e5f49908f9bd44176dbdd2012e84bb6e7bde72af419ada7e8a17e303a

  • SHA512

    ae2a4586d7881811031e441b1ee62ee7a6bc6bbf1e86679c6ef5b695969e7426f7a6d3fff244a8e6cbcb50e31adf1e8ed76947123f898c79634f6df987329be2

  • SSDEEP

    768:/hSksandb4GgyMsp4hyYtoVxYGm1q+R9cFDBMm:/TsGpehyYtkYvYm9cHMm

Malware Config

Extracted

Family

sakula

C2

http://vpn.premrera.com:443/viewpre.asp?cstring=%s&tom=%d&id=%d

http://vpn.premrera.com:443/photo/%s.jpg?id=%d

http://173.254.226.212:443/viewpre.asp?cstring=%s&tom=%d&id=%d

http://173.254.226.212:443/photo/%s.jpg?id=%d

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cd64145da6ddb5857039ef96ca9b47d0_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\cd64145da6ddb5857039ef96ca9b47d0_JC.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3892
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c ping 127.0.0.1 & del "C:\Users\Admin\AppData\Local\Temp\cd64145da6ddb5857039ef96ca9b47d0_JC.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2600
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:2128
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4892
      • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
        C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
        3⤵
        • Executes dropped EXE
        PID:2200
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v "MicroMedia" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2204
      • C:\Windows\SysWOW64\reg.exe
        reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v "MicroMedia" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"
        3⤵
        • Adds Run key to start application
        • Modifies registry key
        PID:1212
  • C:\Windows\system32\rundll32.exe
    "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
    1⤵
      PID:1008
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k UnistackSvcGroup
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1420

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

      Filesize

      42KB

      MD5

      dd1e39404ab2e0cf58cefacf84d3ff30

      SHA1

      6935a2ce627bf767b5b319f26a8f1ff7994cfe92

      SHA256

      972b6bf495800dd78941c02958aa92affce6adaf588de52c6ee2ea79dd13267c

      SHA512

      3b888ef757588bdbe2b22c1002a19a5000ac4d5c4e34564e4a9f31311dcfcd511847306aa052f3d810d5e054ec74e3bc6f431eddd925df81491d0353ade398c5

    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

      Filesize

      42KB

      MD5

      dd1e39404ab2e0cf58cefacf84d3ff30

      SHA1

      6935a2ce627bf767b5b319f26a8f1ff7994cfe92

      SHA256

      972b6bf495800dd78941c02958aa92affce6adaf588de52c6ee2ea79dd13267c

      SHA512

      3b888ef757588bdbe2b22c1002a19a5000ac4d5c4e34564e4a9f31311dcfcd511847306aa052f3d810d5e054ec74e3bc6f431eddd925df81491d0353ade398c5

    • memory/1420-46-0x000001AF7FA60000-0x000001AF7FA61000-memory.dmp

      Filesize

      4KB

    • memory/1420-54-0x000001AF7F680000-0x000001AF7F681000-memory.dmp

      Filesize

      4KB

    • memory/1420-47-0x000001AF7FA60000-0x000001AF7FA61000-memory.dmp

      Filesize

      4KB

    • memory/1420-48-0x000001AF7FA60000-0x000001AF7FA61000-memory.dmp

      Filesize

      4KB

    • memory/1420-8-0x000001AF7F340000-0x000001AF7F350000-memory.dmp

      Filesize

      64KB

    • memory/1420-24-0x000001AF7F440000-0x000001AF7F450000-memory.dmp

      Filesize

      64KB

    • memory/1420-40-0x000001AF7FA30000-0x000001AF7FA31000-memory.dmp

      Filesize

      4KB

    • memory/1420-41-0x000001AF7FA60000-0x000001AF7FA61000-memory.dmp

      Filesize

      4KB

    • memory/1420-42-0x000001AF7FA60000-0x000001AF7FA61000-memory.dmp

      Filesize

      4KB

    • memory/1420-43-0x000001AF7FA60000-0x000001AF7FA61000-memory.dmp

      Filesize

      4KB

    • memory/1420-44-0x000001AF7FA60000-0x000001AF7FA61000-memory.dmp

      Filesize

      4KB

    • memory/1420-45-0x000001AF7FA60000-0x000001AF7FA61000-memory.dmp

      Filesize

      4KB

    • memory/1420-76-0x000001AF7F8D0000-0x000001AF7F8D1000-memory.dmp

      Filesize

      4KB

    • memory/1420-75-0x000001AF7F7C0000-0x000001AF7F7C1000-memory.dmp

      Filesize

      4KB

    • memory/1420-74-0x000001AF7F7C0000-0x000001AF7F7C1000-memory.dmp

      Filesize

      4KB

    • memory/1420-49-0x000001AF7FA60000-0x000001AF7FA61000-memory.dmp

      Filesize

      4KB

    • memory/1420-50-0x000001AF7FA60000-0x000001AF7FA61000-memory.dmp

      Filesize

      4KB

    • memory/1420-51-0x000001AF7F680000-0x000001AF7F681000-memory.dmp

      Filesize

      4KB

    • memory/1420-52-0x000001AF7F670000-0x000001AF7F671000-memory.dmp

      Filesize

      4KB

    • memory/1420-72-0x000001AF7F7B0000-0x000001AF7F7B1000-memory.dmp

      Filesize

      4KB

    • memory/1420-57-0x000001AF7F670000-0x000001AF7F671000-memory.dmp

      Filesize

      4KB

    • memory/1420-60-0x000001AF7F5B0000-0x000001AF7F5B1000-memory.dmp

      Filesize

      4KB

    • memory/2200-7-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/3892-3-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/3892-1-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/3892-0-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB