Analysis
-
max time kernel
156s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2023 19:44
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.fa6f2a81cfe58c75464b718232600590.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
NEAS.fa6f2a81cfe58c75464b718232600590.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.fa6f2a81cfe58c75464b718232600590.exe
-
Size
37KB
-
MD5
fa6f2a81cfe58c75464b718232600590
-
SHA1
76593acd52de4f0e82afffaa801d710f5582b22a
-
SHA256
26be8a8d061e3681dca81b85fe8421e2dcf114fb74f1c4963d75686e16be846e
-
SHA512
90f7e9f6f04dbaf8112a33caeedc55ca3c87f7c76042ad484b26be2c6a3813e95c3cc5d783ee01625e15234356001e168acd0e9412db45456da9c3ad212da4bc
-
SSDEEP
768:D7Xezc/T6Zp14hyYtoVxYF9mH8VQ1PcPW/M9zJ:n6zqhyYtkYWRPTEzJ
Malware Config
Extracted
sakula
http://www.we11point.com:443/view.asp?cookie=%s&type=%d&vid=%d
http://www.we11point.com:443/photo/%s.jpg?vid=%d
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 1960 MediaCenter.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" reg.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
NEAS.fa6f2a81cfe58c75464b718232600590.execmd.execmd.exedescription pid process target process PID 844 wrote to memory of 2124 844 NEAS.fa6f2a81cfe58c75464b718232600590.exe cmd.exe PID 844 wrote to memory of 2124 844 NEAS.fa6f2a81cfe58c75464b718232600590.exe cmd.exe PID 844 wrote to memory of 2124 844 NEAS.fa6f2a81cfe58c75464b718232600590.exe cmd.exe PID 844 wrote to memory of 1960 844 NEAS.fa6f2a81cfe58c75464b718232600590.exe MediaCenter.exe PID 844 wrote to memory of 1960 844 NEAS.fa6f2a81cfe58c75464b718232600590.exe MediaCenter.exe PID 844 wrote to memory of 1960 844 NEAS.fa6f2a81cfe58c75464b718232600590.exe MediaCenter.exe PID 2124 wrote to memory of 4220 2124 cmd.exe reg.exe PID 2124 wrote to memory of 4220 2124 cmd.exe reg.exe PID 2124 wrote to memory of 4220 2124 cmd.exe reg.exe PID 844 wrote to memory of 1448 844 NEAS.fa6f2a81cfe58c75464b718232600590.exe cmd.exe PID 844 wrote to memory of 1448 844 NEAS.fa6f2a81cfe58c75464b718232600590.exe cmd.exe PID 844 wrote to memory of 1448 844 NEAS.fa6f2a81cfe58c75464b718232600590.exe cmd.exe PID 1448 wrote to memory of 2336 1448 cmd.exe PING.EXE PID 1448 wrote to memory of 2336 1448 cmd.exe PING.EXE PID 1448 wrote to memory of 2336 1448 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.fa6f2a81cfe58c75464b718232600590.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.fa6f2a81cfe58c75464b718232600590.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\SysWOW64\cmd.execmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v "MicroMedia" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v "MicroMedia" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"3⤵
- Adds Run key to start application
- Modifies registry key
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:1960 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ping 127.0.0.1 & del "C:\Users\Admin\AppData\Local\Temp\NEAS.fa6f2a81cfe58c75464b718232600590.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:2336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeFilesize
37KB
MD5c3dc5e14ed81ed866847d51986a68d9d
SHA17540c32c0d5bf33ec87405660ad44df3329aa3ee
SHA25679ded2d9de33594feb97b2bd1f02fddb7f999ee9242b9172e80a4e86773dd9fa
SHA51210c4afd60f70e323d30827c605bd329ba9da3d9e8aba0a4b2b2ea436eb4053899a884ae60bb815781773ca499e2f79ae13933cc74fa234ce7d393be0ebbf1076
-
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeFilesize
37KB
MD5c3dc5e14ed81ed866847d51986a68d9d
SHA17540c32c0d5bf33ec87405660ad44df3329aa3ee
SHA25679ded2d9de33594feb97b2bd1f02fddb7f999ee9242b9172e80a4e86773dd9fa
SHA51210c4afd60f70e323d30827c605bd329ba9da3d9e8aba0a4b2b2ea436eb4053899a884ae60bb815781773ca499e2f79ae13933cc74fa234ce7d393be0ebbf1076
-
memory/844-1-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/1960-5-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB