Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
128s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2024, 23:50
Behavioral task
behavioral1
Sample
7d6ba1da4f5b2e43962fe4902245f4133f3026c714cf6fcc56cd4c1702cc2d7b.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
7d6ba1da4f5b2e43962fe4902245f4133f3026c714cf6fcc56cd4c1702cc2d7b.exe
Resource
win10v2004-20240508-en
General
-
Target
7d6ba1da4f5b2e43962fe4902245f4133f3026c714cf6fcc56cd4c1702cc2d7b.exe
-
Size
355KB
-
MD5
9bcc123f6b5ee1d90b79dd78e7e0adc9
-
SHA1
2e096849c0e1c3a4938372c2e41f06ea3c759250
-
SHA256
7d6ba1da4f5b2e43962fe4902245f4133f3026c714cf6fcc56cd4c1702cc2d7b
-
SHA512
c60c4fdf87e4c61eae0b51001e04c17c078c7cbc6d696e0858aec19b6c5dab764ab92284a78867985268c311061eb789fe3004d3e407feb6adf522cdc088fbb6
-
SSDEEP
3072:c0hpgz6xGhYJF30Butn6rout1Rg8BsZh2:c0U6530BA6roS1a+
Malware Config
Signatures
-
Sakula payload 5 IoCs
resource yara_rule behavioral2/memory/1668-1-0x0000000000850000-0x0000000000871000-memory.dmp family_sakula behavioral2/files/0x00080000000233ec-3.dat family_sakula behavioral2/memory/2996-4-0x0000000000DE0000-0x0000000000E01000-memory.dmp family_sakula behavioral2/memory/2996-6-0x0000000000DE0000-0x0000000000E01000-memory.dmp family_sakula behavioral2/memory/1668-7-0x0000000000850000-0x0000000000871000-memory.dmp family_sakula -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 7d6ba1da4f5b2e43962fe4902245f4133f3026c714cf6fcc56cd4c1702cc2d7b.exe -
Executes dropped EXE 1 IoCs
pid Process 2996 MediaCenter.exe -
resource yara_rule behavioral2/memory/1668-1-0x0000000000850000-0x0000000000871000-memory.dmp upx behavioral2/files/0x00080000000233ec-3.dat upx behavioral2/memory/2996-4-0x0000000000DE0000-0x0000000000E01000-memory.dmp upx behavioral2/memory/2996-6-0x0000000000DE0000-0x0000000000E01000-memory.dmp upx behavioral2/memory/1668-7-0x0000000000850000-0x0000000000871000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 7d6ba1da4f5b2e43962fe4902245f4133f3026c714cf6fcc56cd4c1702cc2d7b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4280 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1668 7d6ba1da4f5b2e43962fe4902245f4133f3026c714cf6fcc56cd4c1702cc2d7b.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1668 wrote to memory of 2996 1668 7d6ba1da4f5b2e43962fe4902245f4133f3026c714cf6fcc56cd4c1702cc2d7b.exe 80 PID 1668 wrote to memory of 2996 1668 7d6ba1da4f5b2e43962fe4902245f4133f3026c714cf6fcc56cd4c1702cc2d7b.exe 80 PID 1668 wrote to memory of 2996 1668 7d6ba1da4f5b2e43962fe4902245f4133f3026c714cf6fcc56cd4c1702cc2d7b.exe 80 PID 1668 wrote to memory of 2924 1668 7d6ba1da4f5b2e43962fe4902245f4133f3026c714cf6fcc56cd4c1702cc2d7b.exe 90 PID 1668 wrote to memory of 2924 1668 7d6ba1da4f5b2e43962fe4902245f4133f3026c714cf6fcc56cd4c1702cc2d7b.exe 90 PID 1668 wrote to memory of 2924 1668 7d6ba1da4f5b2e43962fe4902245f4133f3026c714cf6fcc56cd4c1702cc2d7b.exe 90 PID 2924 wrote to memory of 4280 2924 cmd.exe 92 PID 2924 wrote to memory of 4280 2924 cmd.exe 92 PID 2924 wrote to memory of 4280 2924 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d6ba1da4f5b2e43962fe4902245f4133f3026c714cf6fcc56cd4c1702cc2d7b.exe"C:\Users\Admin\AppData\Local\Temp\7d6ba1da4f5b2e43962fe4902245f4133f3026c714cf6fcc56cd4c1702cc2d7b.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:2996
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\7d6ba1da4f5b2e43962fe4902245f4133f3026c714cf6fcc56cd4c1702cc2d7b.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:4280
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
355KB
MD5b94a338b0433400aeb73c09ef851c67d
SHA1874ee573063303fa321e1649f34e9c2c981af086
SHA25617d471d822b8df3495693a15e45678514197b60d6d607dc7c53a215b664c2d7b
SHA512d16618e5cb07d66d35a4b2c231f0033ba57d1cdeb0afa8a8763ce486a12fe1864e24a6f4fdf2bb09888244c034f58fbd7e76d9f55176f4e6fc4a41fffc9349bc