Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
22-10-2023 17:33
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.f57221068bf350b5139860fa859ea350.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.f57221068bf350b5139860fa859ea350.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.f57221068bf350b5139860fa859ea350.exe
-
Size
37KB
-
MD5
f57221068bf350b5139860fa859ea350
-
SHA1
3d51a6a32f709934197d480ab2d3136cb5e2629f
-
SHA256
a5394fc377a2f0e8f4260a40cb0a38f0a5b9e91466243e5e777ede07b65da2ab
-
SHA512
13e97b64d4a970100e64f55dd18d6a1bff5969d57945c136a296cbe7b3c925bbab170919454decf19bb802274d9324c56e00fc24ca49f340cc43cbce0aebdd4f
-
SSDEEP
768:D7Xezc/T6Zp14hyYtoVxYF9mH8VQ1PcPW/M9zx:n6zqhyYtkYWRPTEzx
Malware Config
Extracted
sakula
http://www.we11point.com:443/view.asp?cookie=%s&type=%d&vid=%d
http://www.we11point.com:443/photo/%s.jpg?vid=%d
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 3068 cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 2656 MediaCenter.exe -
Loads dropped DLL 2 IoCs
Processes:
NEAS.f57221068bf350b5139860fa859ea350.exepid process 2280 NEAS.f57221068bf350b5139860fa859ea350.exe 2280 NEAS.f57221068bf350b5139860fa859ea350.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" reg.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
NEAS.f57221068bf350b5139860fa859ea350.execmd.execmd.exedescription pid process target process PID 2280 wrote to memory of 2888 2280 NEAS.f57221068bf350b5139860fa859ea350.exe cmd.exe PID 2280 wrote to memory of 2888 2280 NEAS.f57221068bf350b5139860fa859ea350.exe cmd.exe PID 2280 wrote to memory of 2888 2280 NEAS.f57221068bf350b5139860fa859ea350.exe cmd.exe PID 2280 wrote to memory of 2888 2280 NEAS.f57221068bf350b5139860fa859ea350.exe cmd.exe PID 2280 wrote to memory of 2656 2280 NEAS.f57221068bf350b5139860fa859ea350.exe MediaCenter.exe PID 2280 wrote to memory of 2656 2280 NEAS.f57221068bf350b5139860fa859ea350.exe MediaCenter.exe PID 2280 wrote to memory of 2656 2280 NEAS.f57221068bf350b5139860fa859ea350.exe MediaCenter.exe PID 2280 wrote to memory of 2656 2280 NEAS.f57221068bf350b5139860fa859ea350.exe MediaCenter.exe PID 2888 wrote to memory of 2688 2888 cmd.exe reg.exe PID 2888 wrote to memory of 2688 2888 cmd.exe reg.exe PID 2888 wrote to memory of 2688 2888 cmd.exe reg.exe PID 2888 wrote to memory of 2688 2888 cmd.exe reg.exe PID 2280 wrote to memory of 3068 2280 NEAS.f57221068bf350b5139860fa859ea350.exe cmd.exe PID 2280 wrote to memory of 3068 2280 NEAS.f57221068bf350b5139860fa859ea350.exe cmd.exe PID 2280 wrote to memory of 3068 2280 NEAS.f57221068bf350b5139860fa859ea350.exe cmd.exe PID 2280 wrote to memory of 3068 2280 NEAS.f57221068bf350b5139860fa859ea350.exe cmd.exe PID 3068 wrote to memory of 2264 3068 cmd.exe PING.EXE PID 3068 wrote to memory of 2264 3068 cmd.exe PING.EXE PID 3068 wrote to memory of 2264 3068 cmd.exe PING.EXE PID 3068 wrote to memory of 2264 3068 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.f57221068bf350b5139860fa859ea350.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.f57221068bf350b5139860fa859ea350.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\cmd.execmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v "MicroMedia" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v "MicroMedia" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"3⤵
- Adds Run key to start application
- Modifies registry key
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:2656 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ping 127.0.0.1 & del "C:\Users\Admin\AppData\Local\Temp\NEAS.f57221068bf350b5139860fa859ea350.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:2264
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeFilesize
37KB
MD51eca9b65b093135c0f887d586f41935c
SHA118fcf815752c61c9e1b05d4ff645dab117240b08
SHA256da657f3d6f915c558ee0782f33cccf82fa59ac05fb1611545e022bc918d03c85
SHA51261ca7a23cfafa25b53df24dea5b3a6f9f5c5d3c1cbc22ceb15505b35a38dfa0fa6ae2ed8c54c57fe3cbf78d5598b9e52dfc7a33480e870bb38e4cebfe7f2d976
-
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeFilesize
37KB
MD51eca9b65b093135c0f887d586f41935c
SHA118fcf815752c61c9e1b05d4ff645dab117240b08
SHA256da657f3d6f915c558ee0782f33cccf82fa59ac05fb1611545e022bc918d03c85
SHA51261ca7a23cfafa25b53df24dea5b3a6f9f5c5d3c1cbc22ceb15505b35a38dfa0fa6ae2ed8c54c57fe3cbf78d5598b9e52dfc7a33480e870bb38e4cebfe7f2d976
-
\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeFilesize
37KB
MD51eca9b65b093135c0f887d586f41935c
SHA118fcf815752c61c9e1b05d4ff645dab117240b08
SHA256da657f3d6f915c558ee0782f33cccf82fa59ac05fb1611545e022bc918d03c85
SHA51261ca7a23cfafa25b53df24dea5b3a6f9f5c5d3c1cbc22ceb15505b35a38dfa0fa6ae2ed8c54c57fe3cbf78d5598b9e52dfc7a33480e870bb38e4cebfe7f2d976
-
\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeFilesize
37KB
MD51eca9b65b093135c0f887d586f41935c
SHA118fcf815752c61c9e1b05d4ff645dab117240b08
SHA256da657f3d6f915c558ee0782f33cccf82fa59ac05fb1611545e022bc918d03c85
SHA51261ca7a23cfafa25b53df24dea5b3a6f9f5c5d3c1cbc22ceb15505b35a38dfa0fa6ae2ed8c54c57fe3cbf78d5598b9e52dfc7a33480e870bb38e4cebfe7f2d976
-
memory/2280-0-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/2280-9-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB