Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14-03-2024 03:23
Static task
static1
Behavioral task
behavioral1
Sample
c78e7c778f8104632283c4c92bba2dbb.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
c78e7c778f8104632283c4c92bba2dbb.exe
Resource
win10v2004-20240226-en
General
-
Target
c78e7c778f8104632283c4c92bba2dbb.exe
-
Size
58KB
-
MD5
c78e7c778f8104632283c4c92bba2dbb
-
SHA1
d071031863ed7237cf17aa1fcf57c6873f6ff373
-
SHA256
a41b78d189d6c68ec887203917c59d3cc36cbdde3835b226d8650d2410888fbd
-
SHA512
ac5d31876227f32a339e572c4115a78dba86c1fac03ca9ec857ab1c63acde8afe0971ed42be0d18737b6d4d2ca4719ea2f5b89c5af0d439f2b6d531b1e473af8
-
SSDEEP
1536:iZioIoCwbYP4nuEApQK4TQbtY2gA9DX+ytBO8c3G3eTJ/G:iEoIlwIguEA4c5DgA9DOyq0eFe
Malware Config
Signatures
-
Sakula payload 4 IoCs
resource yara_rule behavioral2/memory/348-6-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula behavioral2/memory/5116-7-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula behavioral2/memory/348-12-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula behavioral2/memory/5116-18-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation c78e7c778f8104632283c4c92bba2dbb.exe -
Executes dropped EXE 1 IoCs
pid Process 5116 MediaCenter.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" c78e7c778f8104632283c4c92bba2dbb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4200 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 348 c78e7c778f8104632283c4c92bba2dbb.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 348 wrote to memory of 5116 348 c78e7c778f8104632283c4c92bba2dbb.exe 87 PID 348 wrote to memory of 5116 348 c78e7c778f8104632283c4c92bba2dbb.exe 87 PID 348 wrote to memory of 5116 348 c78e7c778f8104632283c4c92bba2dbb.exe 87 PID 348 wrote to memory of 4400 348 c78e7c778f8104632283c4c92bba2dbb.exe 102 PID 348 wrote to memory of 4400 348 c78e7c778f8104632283c4c92bba2dbb.exe 102 PID 348 wrote to memory of 4400 348 c78e7c778f8104632283c4c92bba2dbb.exe 102 PID 4400 wrote to memory of 4200 4400 cmd.exe 104 PID 4400 wrote to memory of 4200 4400 cmd.exe 104 PID 4400 wrote to memory of 4200 4400 cmd.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\c78e7c778f8104632283c4c92bba2dbb.exe"C:\Users\Admin\AppData\Local\Temp\c78e7c778f8104632283c4c92bba2dbb.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:348 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:5116
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\c78e7c778f8104632283c4c92bba2dbb.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:4200
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58KB
MD56aaded2e364631f81da8a8e4adcb4dee
SHA1ccce74e84b5c659b69d5d99a3f6f489bd9f1a73a
SHA2562fa2bafa9fdea8b489171e55532aae1fca8acbabff63baca37086e2d77bb56f8
SHA5127cc878f2252ea01ef6e92f294612ac54f1348c0c5101835d944a8d9a46f8e1faeb4c3cdecdbad1865b92b9b85f10bb0a3376a5fd88917b21b2cae19e1d9e3698