Malware Analysis Report

2024-09-11 10:22

Sample ID 240613-1sfswsvhjl
Target 3cb494d3196b21a88fc39ea9fa2f62bfc66b483cf3b3458b72048fc40831fe04
SHA256 3cb494d3196b21a88fc39ea9fa2f62bfc66b483cf3b3458b72048fc40831fe04
Tags
sakula persistence rat trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

3cb494d3196b21a88fc39ea9fa2f62bfc66b483cf3b3458b72048fc40831fe04

Threat Level: Known bad

The file 3cb494d3196b21a88fc39ea9fa2f62bfc66b483cf3b3458b72048fc40831fe04 was found to be: Known bad.

Malicious Activity Summary

sakula persistence rat trojan

Detects executables built or packed with MPress PE compressor

Sakula payload

Sakula

Detects executables built or packed with MPress PE compressor

Executes dropped EXE

Checks computer location settings

Deletes itself

Loads dropped DLL

Adds Run key to start application

Enumerates physical storage devices

Unsigned PE

Runs ping.exe

Suspicious use of WriteProcessMemory

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-13 21:54

Signatures

Detects executables built or packed with MPress PE compressor

Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-13 21:54

Reported

2024-06-13 21:57

Platform

win7-20240611-en

Max time kernel

140s

Max time network

123s

Command Line

"C:\Users\Admin\AppData\Local\Temp\3cb494d3196b21a88fc39ea9fa2f62bfc66b483cf3b3458b72048fc40831fe04.exe"

Signatures

Sakula

trojan rat sakula

Sakula payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Detects executables built or packed with MPress PE compressor

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Deletes itself

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" C:\Users\Admin\AppData\Local\Temp\3cb494d3196b21a88fc39ea9fa2f62bfc66b483cf3b3458b72048fc40831fe04.exe N/A

Enumerates physical storage devices

Runs ping.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\PING.EXE N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3cb494d3196b21a88fc39ea9fa2f62bfc66b483cf3b3458b72048fc40831fe04.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2296 wrote to memory of 2348 N/A C:\Users\Admin\AppData\Local\Temp\3cb494d3196b21a88fc39ea9fa2f62bfc66b483cf3b3458b72048fc40831fe04.exe C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
PID 2296 wrote to memory of 2348 N/A C:\Users\Admin\AppData\Local\Temp\3cb494d3196b21a88fc39ea9fa2f62bfc66b483cf3b3458b72048fc40831fe04.exe C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
PID 2296 wrote to memory of 2348 N/A C:\Users\Admin\AppData\Local\Temp\3cb494d3196b21a88fc39ea9fa2f62bfc66b483cf3b3458b72048fc40831fe04.exe C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
PID 2296 wrote to memory of 2348 N/A C:\Users\Admin\AppData\Local\Temp\3cb494d3196b21a88fc39ea9fa2f62bfc66b483cf3b3458b72048fc40831fe04.exe C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
PID 2296 wrote to memory of 2720 N/A C:\Users\Admin\AppData\Local\Temp\3cb494d3196b21a88fc39ea9fa2f62bfc66b483cf3b3458b72048fc40831fe04.exe C:\Windows\SysWOW64\cmd.exe
PID 2296 wrote to memory of 2720 N/A C:\Users\Admin\AppData\Local\Temp\3cb494d3196b21a88fc39ea9fa2f62bfc66b483cf3b3458b72048fc40831fe04.exe C:\Windows\SysWOW64\cmd.exe
PID 2296 wrote to memory of 2720 N/A C:\Users\Admin\AppData\Local\Temp\3cb494d3196b21a88fc39ea9fa2f62bfc66b483cf3b3458b72048fc40831fe04.exe C:\Windows\SysWOW64\cmd.exe
PID 2296 wrote to memory of 2720 N/A C:\Users\Admin\AppData\Local\Temp\3cb494d3196b21a88fc39ea9fa2f62bfc66b483cf3b3458b72048fc40831fe04.exe C:\Windows\SysWOW64\cmd.exe
PID 2720 wrote to memory of 2628 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\PING.EXE
PID 2720 wrote to memory of 2628 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\PING.EXE
PID 2720 wrote to memory of 2628 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\PING.EXE
PID 2720 wrote to memory of 2628 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\PING.EXE

Processes

C:\Users\Admin\AppData\Local\Temp\3cb494d3196b21a88fc39ea9fa2f62bfc66b483cf3b3458b72048fc40831fe04.exe

"C:\Users\Admin\AppData\Local\Temp\3cb494d3196b21a88fc39ea9fa2f62bfc66b483cf3b3458b72048fc40831fe04.exe"

C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\3cb494d3196b21a88fc39ea9fa2f62bfc66b483cf3b3458b72048fc40831fe04.exe"

C:\Windows\SysWOW64\PING.EXE

ping 127.0.0.1

Network

Country Destination Domain Proto
US 8.8.8.8:53 citrix.vipreclod.com udp
TH 184.22.175.13:80 tcp
TH 184.22.175.13:80 tcp

Files

memory/2296-0-0x0000000000400000-0x000000000041A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

MD5 89d6200e9815f05f44dc7af3fbcb2cd1
SHA1 9ee507b71d9c8f9838a7a8396ef1fbb7f154a316
SHA256 b96d5aa32cdd43b9665969b5f81be61f4f405e5937f8278c480e9890b77513a9
SHA512 021c1ed0b911ce3c4f775b1d4b358bd757384d696d8c1575c62cd6009c070d4d55f31b11797aec79a5e70c1fc8d639b1b4363b559ff1aea8510f32b950b19e43

memory/2348-11-0x0000000000400000-0x000000000041A000-memory.dmp

memory/2296-10-0x0000000000220000-0x000000000023A000-memory.dmp

memory/2296-9-0x0000000000220000-0x000000000023A000-memory.dmp

memory/2296-12-0x0000000000400000-0x000000000041A000-memory.dmp

memory/2348-13-0x0000000000400000-0x000000000041A000-memory.dmp

memory/2296-16-0x0000000000220000-0x000000000023A000-memory.dmp

memory/2296-17-0x0000000000220000-0x000000000023A000-memory.dmp

memory/2296-20-0x0000000000400000-0x000000000041A000-memory.dmp

memory/2348-25-0x0000000000400000-0x000000000041A000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-13 21:54

Reported

2024-06-13 21:57

Platform

win10v2004-20240508-en

Max time kernel

140s

Max time network

135s

Command Line

"C:\Users\Admin\AppData\Local\Temp\3cb494d3196b21a88fc39ea9fa2f62bfc66b483cf3b3458b72048fc40831fe04.exe"

Signatures

Sakula

trojan rat sakula

Sakula payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Detects executables built or packed with MPress PE compressor

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\3cb494d3196b21a88fc39ea9fa2f62bfc66b483cf3b3458b72048fc40831fe04.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" C:\Users\Admin\AppData\Local\Temp\3cb494d3196b21a88fc39ea9fa2f62bfc66b483cf3b3458b72048fc40831fe04.exe N/A

Enumerates physical storage devices

Runs ping.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\PING.EXE N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3cb494d3196b21a88fc39ea9fa2f62bfc66b483cf3b3458b72048fc40831fe04.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\3cb494d3196b21a88fc39ea9fa2f62bfc66b483cf3b3458b72048fc40831fe04.exe

"C:\Users\Admin\AppData\Local\Temp\3cb494d3196b21a88fc39ea9fa2f62bfc66b483cf3b3458b72048fc40831fe04.exe"

C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\3cb494d3196b21a88fc39ea9fa2f62bfc66b483cf3b3458b72048fc40831fe04.exe"

C:\Windows\SysWOW64\PING.EXE

ping 127.0.0.1

Network

Country Destination Domain Proto
US 8.8.8.8:53 citrix.vipreclod.com udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 citrix.vipreclod.com udp
US 8.8.8.8:53 citrix.vipreclod.com udp
US 8.8.8.8:53 citrix.vipreclod.com udp
TH 184.22.175.13:80 tcp

Files

memory/3804-0-0x0000000000400000-0x000000000041A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

MD5 083964481795c8032a0001310c824286
SHA1 197d46e478f6b1d9e386397bb4ba852c02410a2a
SHA256 dc7f53c2e1f05a66a941d9b9d908894215ba98c00abc066882b24f84d96e8952
SHA512 31a82e82a4bf548880a547d97049ae815546258c8f694ebf566f4111c25cb5bbd21c3d773eab4f98045ce1f9f2f809f39ff8d3056cbf44d0c8c1aaea7ddf5eb4

memory/4512-4-0x0000000000400000-0x000000000041A000-memory.dmp

memory/3804-6-0x0000000000400000-0x000000000041A000-memory.dmp

memory/4512-7-0x0000000000400000-0x000000000041A000-memory.dmp

memory/3804-13-0x0000000000400000-0x000000000041A000-memory.dmp

memory/4512-22-0x0000000000400000-0x000000000041A000-memory.dmp