Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
185s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2024, 22:12
Behavioral task
behavioral1
Sample
abd5b72af7ebe14e1c3b7540de2e30cf31e852b53b2c6a55251a6e6756e35a51.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
abd5b72af7ebe14e1c3b7540de2e30cf31e852b53b2c6a55251a6e6756e35a51.exe
Resource
win10v2004-20240226-en
General
-
Target
abd5b72af7ebe14e1c3b7540de2e30cf31e852b53b2c6a55251a6e6756e35a51.exe
-
Size
212KB
-
MD5
1357e64b7017ef220c506b4b539e1a87
-
SHA1
2eaa81c569c5e626d8a36dbdafa285a88d1c2ab1
-
SHA256
abd5b72af7ebe14e1c3b7540de2e30cf31e852b53b2c6a55251a6e6756e35a51
-
SHA512
e226ca35d6e841f0e9b3eacfb323cdecdc4e6a950dcbe6295203cd9ef55d2038c9d9b24c662d6d7f7a77cabface9b2d73fc70fa56f1e6d6e8be561c6bbcca012
-
SSDEEP
1536:ftQFl29mEkE0L1rDEKrxZKF2zf9g2Pl7W/MwbxMX++pdz30rtr8gjXjp0SanB1:u29DkEGRQixVSjLc130BYgjXjpgnB1
Malware Config
Extracted
sakula
www.polarroute.com
Signatures
-
Sakula payload 6 IoCs
resource yara_rule behavioral2/memory/4532-0-0x0000000000400000-0x0000000000435000-memory.dmp family_sakula behavioral2/files/0x000700000002322f-3.dat family_sakula behavioral2/memory/4704-4-0x0000000000400000-0x0000000000435000-memory.dmp family_sakula behavioral2/memory/4532-6-0x0000000000400000-0x0000000000435000-memory.dmp family_sakula behavioral2/memory/4704-7-0x0000000000400000-0x0000000000435000-memory.dmp family_sakula behavioral2/memory/4532-8-0x0000000000400000-0x0000000000435000-memory.dmp family_sakula -
UPX dump on OEP (original entry point) 6 IoCs
resource yara_rule behavioral2/memory/4532-0-0x0000000000400000-0x0000000000435000-memory.dmp UPX behavioral2/files/0x000700000002322f-3.dat UPX behavioral2/memory/4704-4-0x0000000000400000-0x0000000000435000-memory.dmp UPX behavioral2/memory/4532-6-0x0000000000400000-0x0000000000435000-memory.dmp UPX behavioral2/memory/4704-7-0x0000000000400000-0x0000000000435000-memory.dmp UPX behavioral2/memory/4532-8-0x0000000000400000-0x0000000000435000-memory.dmp UPX -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation abd5b72af7ebe14e1c3b7540de2e30cf31e852b53b2c6a55251a6e6756e35a51.exe -
Executes dropped EXE 1 IoCs
pid Process 4704 MediaCenter.exe -
resource yara_rule behavioral2/memory/4532-0-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral2/files/0x000700000002322f-3.dat upx behavioral2/memory/4704-4-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral2/memory/4532-6-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral2/memory/4704-7-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral2/memory/4532-8-0x0000000000400000-0x0000000000435000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" abd5b72af7ebe14e1c3b7540de2e30cf31e852b53b2c6a55251a6e6756e35a51.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4044 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4532 abd5b72af7ebe14e1c3b7540de2e30cf31e852b53b2c6a55251a6e6756e35a51.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4532 wrote to memory of 4704 4532 abd5b72af7ebe14e1c3b7540de2e30cf31e852b53b2c6a55251a6e6756e35a51.exe 89 PID 4532 wrote to memory of 4704 4532 abd5b72af7ebe14e1c3b7540de2e30cf31e852b53b2c6a55251a6e6756e35a51.exe 89 PID 4532 wrote to memory of 4704 4532 abd5b72af7ebe14e1c3b7540de2e30cf31e852b53b2c6a55251a6e6756e35a51.exe 89 PID 4532 wrote to memory of 3720 4532 abd5b72af7ebe14e1c3b7540de2e30cf31e852b53b2c6a55251a6e6756e35a51.exe 98 PID 4532 wrote to memory of 3720 4532 abd5b72af7ebe14e1c3b7540de2e30cf31e852b53b2c6a55251a6e6756e35a51.exe 98 PID 4532 wrote to memory of 3720 4532 abd5b72af7ebe14e1c3b7540de2e30cf31e852b53b2c6a55251a6e6756e35a51.exe 98 PID 3720 wrote to memory of 4044 3720 cmd.exe 101 PID 3720 wrote to memory of 4044 3720 cmd.exe 101 PID 3720 wrote to memory of 4044 3720 cmd.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\abd5b72af7ebe14e1c3b7540de2e30cf31e852b53b2c6a55251a6e6756e35a51.exe"C:\Users\Admin\AppData\Local\Temp\abd5b72af7ebe14e1c3b7540de2e30cf31e852b53b2c6a55251a6e6756e35a51.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:4704
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\abd5b72af7ebe14e1c3b7540de2e30cf31e852b53b2c6a55251a6e6756e35a51.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:4044
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212KB
MD5f322cb0376caae1de7743a51bb71b11e
SHA16c332c8e9f67966f105fba30e39df43f18a0052e
SHA2568df21b8ecc104329b5131e97046a1f350e74ea2d1dec4550cc8e84b276e7f51e
SHA51206fd306a304a571c1eaabcbf48081492f81e8c606cc2d70fd2be85caeb9768c5c5eeb87866c2158339a10a3af09702e5d36b6977ff113a436533dbc5aa1230d1