Analysis
-
max time kernel
110s -
max time network
94s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 00:02
Behavioral task
behavioral1
Sample
45bd688a2af2f726b45f46a69e01bd20N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
45bd688a2af2f726b45f46a69e01bd20N.exe
Resource
win10v2004-20240709-en
General
-
Target
45bd688a2af2f726b45f46a69e01bd20N.exe
-
Size
43KB
-
MD5
45bd688a2af2f726b45f46a69e01bd20
-
SHA1
311c408a1f0c1b660b5c85eb62432e6415fabb49
-
SHA256
e4e087540820a2b9d931a09e20b8f8f6599f33b57400ae88dabf093a86e30ef6
-
SHA512
a6b59a2b4dba9d36ac0ad9d1dcf282fb9bf82ffa040066de61d787bec063c03ee6567672750c500efba2c1a74ec11072dd5469b6e4b558a46ad46542dad2502e
-
SSDEEP
768:+U9XnKJv8KrtPNxT4oreP7cIK3yQpdk6x8pf9m4P/S0hVvIZiGDZ6RO8nHE8taqf:+U9abrtX4oocIK3yQkaY9z/S0hhy6k8l
Malware Config
Signatures
-
Sakula payload 5 IoCs
resource yara_rule behavioral1/memory/2980-11-0x00000000000C0000-0x00000000000DF000-memory.dmp family_sakula behavioral1/memory/2068-12-0x0000000000850000-0x000000000086F000-memory.dmp family_sakula behavioral1/memory/2980-13-0x00000000000C0000-0x00000000000DF000-memory.dmp family_sakula behavioral1/memory/2068-20-0x0000000000850000-0x000000000086F000-memory.dmp family_sakula behavioral1/memory/2980-23-0x00000000000C0000-0x00000000000DF000-memory.dmp family_sakula -
Deletes itself 1 IoCs
pid Process 2712 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2980 MediaCenter.exe -
Loads dropped DLL 2 IoCs
pid Process 2068 45bd688a2af2f726b45f46a69e01bd20N.exe 2068 45bd688a2af2f726b45f46a69e01bd20N.exe -
resource yara_rule behavioral1/memory/2068-0-0x0000000000850000-0x000000000086F000-memory.dmp upx behavioral1/files/0x0008000000015e21-2.dat upx behavioral1/memory/2980-11-0x00000000000C0000-0x00000000000DF000-memory.dmp upx behavioral1/memory/2068-8-0x00000000001F0000-0x000000000020F000-memory.dmp upx behavioral1/memory/2068-12-0x0000000000850000-0x000000000086F000-memory.dmp upx behavioral1/memory/2980-13-0x00000000000C0000-0x00000000000DF000-memory.dmp upx behavioral1/memory/2068-20-0x0000000000850000-0x000000000086F000-memory.dmp upx behavioral1/memory/2980-23-0x00000000000C0000-0x00000000000DF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 45bd688a2af2f726b45f46a69e01bd20N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 264 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2068 45bd688a2af2f726b45f46a69e01bd20N.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2980 2068 45bd688a2af2f726b45f46a69e01bd20N.exe 30 PID 2068 wrote to memory of 2980 2068 45bd688a2af2f726b45f46a69e01bd20N.exe 30 PID 2068 wrote to memory of 2980 2068 45bd688a2af2f726b45f46a69e01bd20N.exe 30 PID 2068 wrote to memory of 2980 2068 45bd688a2af2f726b45f46a69e01bd20N.exe 30 PID 2068 wrote to memory of 2712 2068 45bd688a2af2f726b45f46a69e01bd20N.exe 33 PID 2068 wrote to memory of 2712 2068 45bd688a2af2f726b45f46a69e01bd20N.exe 33 PID 2068 wrote to memory of 2712 2068 45bd688a2af2f726b45f46a69e01bd20N.exe 33 PID 2068 wrote to memory of 2712 2068 45bd688a2af2f726b45f46a69e01bd20N.exe 33 PID 2712 wrote to memory of 264 2712 cmd.exe 35 PID 2712 wrote to memory of 264 2712 cmd.exe 35 PID 2712 wrote to memory of 264 2712 cmd.exe 35 PID 2712 wrote to memory of 264 2712 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\45bd688a2af2f726b45f46a69e01bd20N.exe"C:\Users\Admin\AppData\Local\Temp\45bd688a2af2f726b45f46a69e01bd20N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:2980
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\45bd688a2af2f726b45f46a69e01bd20N.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:264
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD55a2cd935d455bcd591f878f6622e2367
SHA1e7483937250e7e4dde05980d5e566de503b14dd2
SHA256f65be4aa1d2083f68a091bc374c602fe9dc63559c8d5c7f2d08e1a57f5f3a3d7
SHA5123bd49cd2ae47b68a27cb10ad5e3bee2bed00d58c75212e49bad08f9f94d43b522254c976707facd55f7bf53d5201992e068124caee2976c2f091eaa2eb54d3a8