Analysis
-
max time kernel
140s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2024 15:27
Behavioral task
behavioral1
Sample
cae80def5320d2025543a59655339730_NEAS.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cae80def5320d2025543a59655339730_NEAS.exe
Resource
win10v2004-20240419-en
General
-
Target
cae80def5320d2025543a59655339730_NEAS.exe
-
Size
43KB
-
MD5
cae80def5320d2025543a59655339730
-
SHA1
859f745e7fe2dc3096ee8e5a1e33537a6da83d0d
-
SHA256
bfbc960adefcc4978bbc1ebcc92c124ff5720faa6fc5c85b9fc2ad91e708b5e4
-
SHA512
82ab455277862f7e9a8b5ac2683586e5332a19c99518317e370ccca1154c2c54a83507fa94662dee0f7521b3dc7cd11af60b8be249907265c4aebd2b0d5cf46c
-
SSDEEP
768:FUiX34HOc2Lsh7mfUolW/xtNEM5iZhcOL0tTChQEgHDR7:VYE4Z4lsjNbtNEq7
Malware Config
Signatures
-
Sakula payload 4 IoCs
resource yara_rule behavioral2/memory/428-3-0x0000000000270000-0x000000000028B000-memory.dmp family_sakula behavioral2/memory/4852-7-0x00000000002D0000-0x00000000002EB000-memory.dmp family_sakula behavioral2/memory/428-13-0x0000000000270000-0x000000000028B000-memory.dmp family_sakula behavioral2/memory/4852-18-0x00000000002D0000-0x00000000002EB000-memory.dmp family_sakula -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation cae80def5320d2025543a59655339730_NEAS.exe -
Executes dropped EXE 1 IoCs
pid Process 4852 MediaCenter.exe -
resource yara_rule behavioral2/files/0x000d000000023b87-2.dat upx behavioral2/memory/4852-4-0x00000000002D0000-0x00000000002EB000-memory.dmp upx behavioral2/memory/428-3-0x0000000000270000-0x000000000028B000-memory.dmp upx behavioral2/memory/4852-7-0x00000000002D0000-0x00000000002EB000-memory.dmp upx behavioral2/memory/428-13-0x0000000000270000-0x000000000028B000-memory.dmp upx behavioral2/memory/4852-18-0x00000000002D0000-0x00000000002EB000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" cae80def5320d2025543a59655339730_NEAS.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 848 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 428 cae80def5320d2025543a59655339730_NEAS.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 428 wrote to memory of 4852 428 cae80def5320d2025543a59655339730_NEAS.exe 83 PID 428 wrote to memory of 4852 428 cae80def5320d2025543a59655339730_NEAS.exe 83 PID 428 wrote to memory of 4852 428 cae80def5320d2025543a59655339730_NEAS.exe 83 PID 428 wrote to memory of 1412 428 cae80def5320d2025543a59655339730_NEAS.exe 97 PID 428 wrote to memory of 1412 428 cae80def5320d2025543a59655339730_NEAS.exe 97 PID 428 wrote to memory of 1412 428 cae80def5320d2025543a59655339730_NEAS.exe 97 PID 1412 wrote to memory of 848 1412 cmd.exe 99 PID 1412 wrote to memory of 848 1412 cmd.exe 99 PID 1412 wrote to memory of 848 1412 cmd.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\cae80def5320d2025543a59655339730_NEAS.exe"C:\Users\Admin\AppData\Local\Temp\cae80def5320d2025543a59655339730_NEAS.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:4852
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\cae80def5320d2025543a59655339730_NEAS.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:848
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD5ca750f6130a37b9aa09af736c4213623
SHA162bc80541d6fa9c6ff03e07bd51ef1fc6103630a
SHA256e3ba3ee55b56430964c909bebfe87535e8909ca78581c24cbf7ba0bd11235fc2
SHA512df5beea3a81df813b23310c7165dfb9009890f46d827ba515ea36104fc2256e17ea5498685878f833ddbd5f562cefb2be657e50d0252437b83ac529cdfa17f43