Analysis

  • max time kernel
    140s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-10-2023 20:47

General

  • Target

    NEAS.d1ae88b6359c014db3936ee49b49ae10.exe

  • Size

    76KB

  • MD5

    d1ae88b6359c014db3936ee49b49ae10

  • SHA1

    fe4b9dfed33cbf0ef5faedcf4bac33f8910d28be

  • SHA256

    63021500b354f3f4e5a97eefcc5c97958377945ca6cb90c9b9242b1e3eecfd03

  • SHA512

    2546cbe0da5451df23a30b085d81af08e09ceadb0660e67d89d7855c47fd3615c8835c40e1cb0363edc00dd7a7765e2bcb86612043df6b5f8ea20e08b4100924

  • SSDEEP

    768:FhSksandb4GgyMsp4hyYtoVxYGm1ZAIPsED3VK2+ZtyOjgO4r9vFAg2rqK:FTsGpehyYtkYvnbYTjipvF2L

Malware Config

Extracted

Family

sakula

C2

http://vpn.premrera.com:443/viewpre.asp?cstring=%s&tom=%d&id=%d

http://vpn.premrera.com:443/photo/%s.jpg?id=%d

http://173.254.226.212:443/viewpre.asp?cstring=%s&tom=%d&id=%d

http://173.254.226.212:443/photo/%s.jpg?id=%d

Signatures

  • Sakula

    Sakula is a remote access trojan with various capabilities.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.d1ae88b6359c014db3936ee49b49ae10.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.d1ae88b6359c014db3936ee49b49ae10.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5020
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v "MicroMedia" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1844
      • C:\Windows\SysWOW64\reg.exe
        reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v "MicroMedia" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"
        3⤵
        • Adds Run key to start application
        • Modifies registry key
        PID:4292
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c ping 127.0.0.1 & del "C:\Users\Admin\AppData\Local\Temp\NEAS.d1ae88b6359c014db3936ee49b49ae10.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4084
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:2096
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1056
      • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
        C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
        3⤵
        • Executes dropped EXE
        PID:3776

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    Filesize

    76KB

    MD5

    3db650beba143a4e3542c30ae12581d0

    SHA1

    253c893ed5144c7f385a195c65151388cbe3df79

    SHA256

    443ee05de164ed05aa23e442fc26b521c5629243165fd031edc4a747d48eec60

    SHA512

    7feaabd17129e480edee8b1620ce5c5db8986cb0c4f7a9802bbedd8d655f9c1989e805e8bd2b0fc37d24feebeac29379b243fd59c7e18a9ed2a0e7ff306e18ae

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
    Filesize

    76KB

    MD5

    3db650beba143a4e3542c30ae12581d0

    SHA1

    253c893ed5144c7f385a195c65151388cbe3df79

    SHA256

    443ee05de164ed05aa23e442fc26b521c5629243165fd031edc4a747d48eec60

    SHA512

    7feaabd17129e480edee8b1620ce5c5db8986cb0c4f7a9802bbedd8d655f9c1989e805e8bd2b0fc37d24feebeac29379b243fd59c7e18a9ed2a0e7ff306e18ae

  • memory/3776-8-0x0000000000400000-0x000000000040C000-memory.dmp
    Filesize

    48KB

  • memory/3776-9-0x0000000000400000-0x000000000040C000-memory.dmp
    Filesize

    48KB

  • memory/3776-10-0x0000000000400000-0x000000000040C000-memory.dmp
    Filesize

    48KB

  • memory/5020-0-0x0000000000400000-0x000000000040C000-memory.dmp
    Filesize

    48KB

  • memory/5020-1-0x0000000000400000-0x000000000040C000-memory.dmp
    Filesize

    48KB

  • memory/5020-2-0x0000000000400000-0x000000000040C000-memory.dmp
    Filesize

    48KB

  • memory/5020-4-0x0000000000400000-0x000000000040C000-memory.dmp
    Filesize

    48KB