Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11-04-2024 22:18
Static task
static1
Behavioral task
behavioral1
Sample
6ed57cc74fd6b6d1c0cbf3c4fe5b5beee47df148f1c8bdabbf1d3b9a17347231.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6ed57cc74fd6b6d1c0cbf3c4fe5b5beee47df148f1c8bdabbf1d3b9a17347231.exe
Resource
win10v2004-20240226-en
General
-
Target
6ed57cc74fd6b6d1c0cbf3c4fe5b5beee47df148f1c8bdabbf1d3b9a17347231.exe
-
Size
64KB
-
MD5
1119a0e6971e5c0773c780ed380c9ae5
-
SHA1
7b2ea5a52d4875caf342877befa5c1ea62e6db5d
-
SHA256
6ed57cc74fd6b6d1c0cbf3c4fe5b5beee47df148f1c8bdabbf1d3b9a17347231
-
SHA512
4154d97e6973b7c6b037dd274dee90f361a7dd4378de4c26454499df24513c6aaddf9a404346360b2c566ac4e5a502c4e54e1ed47456e6d3c9d382f4af3f4b5e
-
SSDEEP
768:Y0gD04rmpLAuJGlfAHI9lqnP8q0gXg0uvsVWZz/L4i/ym23ysRaKFt9kS3DCkeI9:YNpmpkzAHkq0gXgffZgiKKsDNDCkruk
Malware Config
Extracted
sakula
www.polarroute.com
Signatures
-
Sakula payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/624-5-0x0000000000400000-0x0000000000423000-memory.dmp family_sakula behavioral2/memory/4508-6-0x0000000000400000-0x0000000000423000-memory.dmp family_sakula behavioral2/memory/624-11-0x0000000000400000-0x0000000000423000-memory.dmp family_sakula behavioral2/memory/4508-17-0x0000000000400000-0x0000000000423000-memory.dmp family_sakula -
UPX dump on OEP (original entry point) 6 IoCs
Processes:
resource yara_rule behavioral2/memory/624-0-0x0000000000400000-0x0000000000423000-memory.dmp UPX C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe UPX behavioral2/memory/624-5-0x0000000000400000-0x0000000000423000-memory.dmp UPX behavioral2/memory/4508-6-0x0000000000400000-0x0000000000423000-memory.dmp UPX behavioral2/memory/624-11-0x0000000000400000-0x0000000000423000-memory.dmp UPX behavioral2/memory/4508-17-0x0000000000400000-0x0000000000423000-memory.dmp UPX -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
6ed57cc74fd6b6d1c0cbf3c4fe5b5beee47df148f1c8bdabbf1d3b9a17347231.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation 6ed57cc74fd6b6d1c0cbf3c4fe5b5beee47df148f1c8bdabbf1d3b9a17347231.exe -
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 4508 MediaCenter.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
6ed57cc74fd6b6d1c0cbf3c4fe5b5beee47df148f1c8bdabbf1d3b9a17347231.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 6ed57cc74fd6b6d1c0cbf3c4fe5b5beee47df148f1c8bdabbf1d3b9a17347231.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
6ed57cc74fd6b6d1c0cbf3c4fe5b5beee47df148f1c8bdabbf1d3b9a17347231.exedescription pid process Token: SeIncBasePriorityPrivilege 624 6ed57cc74fd6b6d1c0cbf3c4fe5b5beee47df148f1c8bdabbf1d3b9a17347231.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
6ed57cc74fd6b6d1c0cbf3c4fe5b5beee47df148f1c8bdabbf1d3b9a17347231.execmd.exedescription pid process target process PID 624 wrote to memory of 4508 624 6ed57cc74fd6b6d1c0cbf3c4fe5b5beee47df148f1c8bdabbf1d3b9a17347231.exe MediaCenter.exe PID 624 wrote to memory of 4508 624 6ed57cc74fd6b6d1c0cbf3c4fe5b5beee47df148f1c8bdabbf1d3b9a17347231.exe MediaCenter.exe PID 624 wrote to memory of 4508 624 6ed57cc74fd6b6d1c0cbf3c4fe5b5beee47df148f1c8bdabbf1d3b9a17347231.exe MediaCenter.exe PID 624 wrote to memory of 1700 624 6ed57cc74fd6b6d1c0cbf3c4fe5b5beee47df148f1c8bdabbf1d3b9a17347231.exe cmd.exe PID 624 wrote to memory of 1700 624 6ed57cc74fd6b6d1c0cbf3c4fe5b5beee47df148f1c8bdabbf1d3b9a17347231.exe cmd.exe PID 624 wrote to memory of 1700 624 6ed57cc74fd6b6d1c0cbf3c4fe5b5beee47df148f1c8bdabbf1d3b9a17347231.exe cmd.exe PID 1700 wrote to memory of 396 1700 cmd.exe PING.EXE PID 1700 wrote to memory of 396 1700 cmd.exe PING.EXE PID 1700 wrote to memory of 396 1700 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ed57cc74fd6b6d1c0cbf3c4fe5b5beee47df148f1c8bdabbf1d3b9a17347231.exe"C:\Users\Admin\AppData\Local\Temp\6ed57cc74fd6b6d1c0cbf3c4fe5b5beee47df148f1c8bdabbf1d3b9a17347231.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:4508 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\6ed57cc74fd6b6d1c0cbf3c4fe5b5beee47df148f1c8bdabbf1d3b9a17347231.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:396
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD58832c24a931a797b2cf862799625a502
SHA143bea50ffe2ec84f1c9096f0d0075a81109d5bd6
SHA2563eebad983a42dad930f4bc6689cd27d8b2d27d8d5c85ce578b4515c4520bac2b
SHA512ad247752a1653a680de12a9ac95afea7351643132ed58a342e5cc200f6fdbe3c395486a3ff174e7ea8d714112392496fb6a5052763c812d3b023e78b9aed3717