Analysis
-
max time kernel
165s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 06:43
Static task
static1
Behavioral task
behavioral1
Sample
2c110dcd325fa342b9ccb23139920b8f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2c110dcd325fa342b9ccb23139920b8f.exe
Resource
win10v2004-20231215-en
General
-
Target
2c110dcd325fa342b9ccb23139920b8f.exe
-
Size
58KB
-
MD5
2c110dcd325fa342b9ccb23139920b8f
-
SHA1
8702aa4aff2b991ca57d8b4af944fe95eb75778e
-
SHA256
f2fbd9f969a2e86d7417b9fd85ef0eec88d93682e587e6be93243e47aee3c0e8
-
SHA512
dab340af428e7e333eb9f37bcd0c3a8f2f442e0eaf214c7e4f6dbd03f687e0235c618a897f67c7bf5bd9575c50c26dd15214050233aaa35f1bc9602aeb2ba885
-
SSDEEP
1536:iZioIoCwbYP4nuEApQK4TQbtY2gA9DX+ytBO8c3G3eTJ/P:iEoIlwIguEA4c5DgA9DOyq0eFn
Malware Config
Signatures
-
Sakula payload 4 IoCs
resource yara_rule behavioral2/memory/4464-7-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula behavioral2/memory/4684-9-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula behavioral2/memory/4464-18-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula behavioral2/memory/4684-20-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 2c110dcd325fa342b9ccb23139920b8f.exe -
Executes dropped EXE 1 IoCs
pid Process 4684 MediaCenter.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 2c110dcd325fa342b9ccb23139920b8f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2808 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4464 2c110dcd325fa342b9ccb23139920b8f.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4464 wrote to memory of 4684 4464 2c110dcd325fa342b9ccb23139920b8f.exe 96 PID 4464 wrote to memory of 4684 4464 2c110dcd325fa342b9ccb23139920b8f.exe 96 PID 4464 wrote to memory of 4684 4464 2c110dcd325fa342b9ccb23139920b8f.exe 96 PID 4464 wrote to memory of 4436 4464 2c110dcd325fa342b9ccb23139920b8f.exe 100 PID 4464 wrote to memory of 4436 4464 2c110dcd325fa342b9ccb23139920b8f.exe 100 PID 4464 wrote to memory of 4436 4464 2c110dcd325fa342b9ccb23139920b8f.exe 100 PID 4436 wrote to memory of 2808 4436 cmd.exe 102 PID 4436 wrote to memory of 2808 4436 cmd.exe 102 PID 4436 wrote to memory of 2808 4436 cmd.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c110dcd325fa342b9ccb23139920b8f.exe"C:\Users\Admin\AppData\Local\Temp\2c110dcd325fa342b9ccb23139920b8f.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:4684
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\2c110dcd325fa342b9ccb23139920b8f.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:2808
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58KB
MD584ed5487e69c60d24b0266855ea97c38
SHA143ba53a76b253106cd6b934f31ed8ec7dcd00260
SHA2568847f0cb50303e2659283f062bd3f1bdf74b05ec7af3f5e412a0fda4fae5e4e4
SHA512e9baa6908430759d046a1c1a63d8b415e26bf48b4620dbba1239a2a6756a93075688929d71449417ef8e6685e24d80c3f0f182a6911b36dd608e46e4bf3bfd85