Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
13-09-2023 17:57
Static task
static1
Behavioral task
behavioral1
Sample
cd64145da6ddb5857039ef96ca9b47d0_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
cd64145da6ddb5857039ef96ca9b47d0_JC.exe
Resource
win10v2004-20230831-en
General
-
Target
cd64145da6ddb5857039ef96ca9b47d0_JC.exe
-
Size
42KB
-
MD5
cd64145da6ddb5857039ef96ca9b47d0
-
SHA1
75917fb5294498f70f1472aaafab27a892e3e614
-
SHA256
4e64e96e5f49908f9bd44176dbdd2012e84bb6e7bde72af419ada7e8a17e303a
-
SHA512
ae2a4586d7881811031e441b1ee62ee7a6bc6bbf1e86679c6ef5b695969e7426f7a6d3fff244a8e6cbcb50e31adf1e8ed76947123f898c79634f6df987329be2
-
SSDEEP
768:/hSksandb4GgyMsp4hyYtoVxYGm1q+R9cFDBMm:/TsGpehyYtkYvYm9cHMm
Malware Config
Extracted
sakula
http://vpn.premrera.com:443/viewpre.asp?cstring=%s&tom=%d&id=%d
http://vpn.premrera.com:443/photo/%s.jpg?id=%d
http://173.254.226.212:443/viewpre.asp?cstring=%s&tom=%d&id=%d
http://173.254.226.212:443/photo/%s.jpg?id=%d
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 2200 MediaCenter.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" reg.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
svchost.exedescription pid process Token: SeManageVolumePrivilege 1420 svchost.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
cd64145da6ddb5857039ef96ca9b47d0_JC.execmd.execmd.execmd.exedescription pid process target process PID 3892 wrote to memory of 2204 3892 cd64145da6ddb5857039ef96ca9b47d0_JC.exe cmd.exe PID 3892 wrote to memory of 2204 3892 cd64145da6ddb5857039ef96ca9b47d0_JC.exe cmd.exe PID 3892 wrote to memory of 2204 3892 cd64145da6ddb5857039ef96ca9b47d0_JC.exe cmd.exe PID 3892 wrote to memory of 4892 3892 cd64145da6ddb5857039ef96ca9b47d0_JC.exe cmd.exe PID 3892 wrote to memory of 4892 3892 cd64145da6ddb5857039ef96ca9b47d0_JC.exe cmd.exe PID 3892 wrote to memory of 4892 3892 cd64145da6ddb5857039ef96ca9b47d0_JC.exe cmd.exe PID 3892 wrote to memory of 2600 3892 cd64145da6ddb5857039ef96ca9b47d0_JC.exe cmd.exe PID 3892 wrote to memory of 2600 3892 cd64145da6ddb5857039ef96ca9b47d0_JC.exe cmd.exe PID 3892 wrote to memory of 2600 3892 cd64145da6ddb5857039ef96ca9b47d0_JC.exe cmd.exe PID 2600 wrote to memory of 2128 2600 cmd.exe PING.EXE PID 2600 wrote to memory of 2128 2600 cmd.exe PING.EXE PID 2600 wrote to memory of 2128 2600 cmd.exe PING.EXE PID 2204 wrote to memory of 1212 2204 cmd.exe reg.exe PID 2204 wrote to memory of 1212 2204 cmd.exe reg.exe PID 2204 wrote to memory of 1212 2204 cmd.exe reg.exe PID 4892 wrote to memory of 2200 4892 cmd.exe MediaCenter.exe PID 4892 wrote to memory of 2200 4892 cmd.exe MediaCenter.exe PID 4892 wrote to memory of 2200 4892 cmd.exe MediaCenter.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd64145da6ddb5857039ef96ca9b47d0_JC.exe"C:\Users\Admin\AppData\Local\Temp\cd64145da6ddb5857039ef96ca9b47d0_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ping 127.0.0.1 & del "C:\Users\Admin\AppData\Local\Temp\cd64145da6ddb5857039ef96ca9b47d0_JC.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:2128
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe3⤵
- Executes dropped EXE
PID:2200
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v "MicroMedia" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v "MicroMedia" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"3⤵
- Adds Run key to start application
- Modifies registry key
PID:1212
-
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:1008
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1420
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD5dd1e39404ab2e0cf58cefacf84d3ff30
SHA16935a2ce627bf767b5b319f26a8f1ff7994cfe92
SHA256972b6bf495800dd78941c02958aa92affce6adaf588de52c6ee2ea79dd13267c
SHA5123b888ef757588bdbe2b22c1002a19a5000ac4d5c4e34564e4a9f31311dcfcd511847306aa052f3d810d5e054ec74e3bc6f431eddd925df81491d0353ade398c5
-
Filesize
42KB
MD5dd1e39404ab2e0cf58cefacf84d3ff30
SHA16935a2ce627bf767b5b319f26a8f1ff7994cfe92
SHA256972b6bf495800dd78941c02958aa92affce6adaf588de52c6ee2ea79dd13267c
SHA5123b888ef757588bdbe2b22c1002a19a5000ac4d5c4e34564e4a9f31311dcfcd511847306aa052f3d810d5e054ec74e3bc6f431eddd925df81491d0353ade398c5