Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 08:55
Behavioral task
behavioral1
Sample
b0b18ee35a72adbc8ae250bd4da1aeb0N.exe
Resource
win7-20240704-en
General
-
Target
b0b18ee35a72adbc8ae250bd4da1aeb0N.exe
-
Size
283KB
-
MD5
b0b18ee35a72adbc8ae250bd4da1aeb0
-
SHA1
cc0a8d5a77305643882c522b36ecd24085a3189f
-
SHA256
f1d87ff8d6fa2214a286638f2a539c0ddea67c938835b4b09cd3f7ed8daf2533
-
SHA512
e46e4bbfe9b650da8b1365a9ccf6cc6d8069eefb9dee92bfdaa109106d985eca2326aa60b2f390e7184087b770d5fe5d2954fd47d7b72673189f54317ae0f946
-
SSDEEP
1536:NU9abrtX4oocIK3yQkaY9z/S0hhnDiKKJqTnouy8HeBsCXKTnhxJv:Nm2rocIyhYtJxKJqrout+BsZhX
Malware Config
Signatures
-
Sakula payload 4 IoCs
resource yara_rule behavioral2/memory/4152-6-0x00000000000E0000-0x00000000000FF000-memory.dmp family_sakula behavioral2/memory/3020-7-0x0000000000DD0000-0x0000000000DEF000-memory.dmp family_sakula behavioral2/memory/4152-13-0x00000000000E0000-0x00000000000FF000-memory.dmp family_sakula behavioral2/memory/3020-18-0x0000000000DD0000-0x0000000000DEF000-memory.dmp family_sakula -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation b0b18ee35a72adbc8ae250bd4da1aeb0N.exe -
Executes dropped EXE 1 IoCs
pid Process 3020 MediaCenter.exe -
resource yara_rule behavioral2/memory/4152-0-0x00000000000E0000-0x00000000000FF000-memory.dmp upx behavioral2/files/0x00080000000234d9-3.dat upx behavioral2/memory/3020-5-0x0000000000DD0000-0x0000000000DEF000-memory.dmp upx behavioral2/memory/4152-6-0x00000000000E0000-0x00000000000FF000-memory.dmp upx behavioral2/memory/3020-7-0x0000000000DD0000-0x0000000000DEF000-memory.dmp upx behavioral2/memory/4152-13-0x00000000000E0000-0x00000000000FF000-memory.dmp upx behavioral2/memory/3020-18-0x0000000000DD0000-0x0000000000DEF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" b0b18ee35a72adbc8ae250bd4da1aeb0N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b0b18ee35a72adbc8ae250bd4da1aeb0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MediaCenter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 840 cmd.exe 3408 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3408 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4152 b0b18ee35a72adbc8ae250bd4da1aeb0N.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4152 wrote to memory of 3020 4152 b0b18ee35a72adbc8ae250bd4da1aeb0N.exe 84 PID 4152 wrote to memory of 3020 4152 b0b18ee35a72adbc8ae250bd4da1aeb0N.exe 84 PID 4152 wrote to memory of 3020 4152 b0b18ee35a72adbc8ae250bd4da1aeb0N.exe 84 PID 4152 wrote to memory of 840 4152 b0b18ee35a72adbc8ae250bd4da1aeb0N.exe 97 PID 4152 wrote to memory of 840 4152 b0b18ee35a72adbc8ae250bd4da1aeb0N.exe 97 PID 4152 wrote to memory of 840 4152 b0b18ee35a72adbc8ae250bd4da1aeb0N.exe 97 PID 840 wrote to memory of 3408 840 cmd.exe 99 PID 840 wrote to memory of 3408 840 cmd.exe 99 PID 840 wrote to memory of 3408 840 cmd.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0b18ee35a72adbc8ae250bd4da1aeb0N.exe"C:\Users\Admin\AppData\Local\Temp\b0b18ee35a72adbc8ae250bd4da1aeb0N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3020
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\b0b18ee35a72adbc8ae250bd4da1aeb0N.exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3408
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
283KB
MD566d36857c77dfae6494b421331c6e8d7
SHA1b62ed19cc908717fcf5caed799eaf5383b6b4aa3
SHA256acef2cb8008e1ae8fd8b816bd2fc07aef1621c6f6ec7ce8b7b26e57d12e6ff46
SHA5120b4bbd26ed74590d13c4ccedcfb308e798400fcbfb23da6b3946721c3f647d3da88608f6d3d494d4f34e660ddf92a599b09dcfce18c29a864549795bbbffe0b2