Analysis
-
max time kernel
111s -
max time network
115s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01/09/2024, 01:59
Static task
static1
Behavioral task
behavioral1
Sample
6197867738e3f4ebd03828910a0c0190N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6197867738e3f4ebd03828910a0c0190N.exe
Resource
win10v2004-20240802-en
General
-
Target
6197867738e3f4ebd03828910a0c0190N.exe
-
Size
60KB
-
MD5
6197867738e3f4ebd03828910a0c0190
-
SHA1
04708a51815345a46b844322ef1d97bc9289b6f9
-
SHA256
dcf2c0fc88a37f671dbf38ca469a6de82b23f8525fb22f4942a1b915bac0c161
-
SHA512
9af80cf9491b975bfa7f5380484d90b51c1639e219e9777feafc932b6853e46486547ef59015a0542bb52e3e3f4bbc63c172e04b4be5f8477ddbea370589309a
-
SSDEEP
1536:iZioIoCwbYP4nuEApQK4TQbtY2gA9DX+ytBO8c3G3eTJ/h:iEoIlwIguEA4c5DgA9DOyq0eFp
Malware Config
Signatures
-
Sakula payload 5 IoCs
resource yara_rule behavioral1/memory/2700-11-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula behavioral1/memory/2252-12-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula behavioral1/memory/2700-16-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula behavioral1/memory/2252-22-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula behavioral1/memory/2700-28-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula -
Deletes itself 1 IoCs
pid Process 2600 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2700 MediaCenter.exe -
Loads dropped DLL 2 IoCs
pid Process 2252 6197867738e3f4ebd03828910a0c0190N.exe 2252 6197867738e3f4ebd03828910a0c0190N.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 6197867738e3f4ebd03828910a0c0190N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6197867738e3f4ebd03828910a0c0190N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MediaCenter.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2600 cmd.exe 3040 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3040 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2252 6197867738e3f4ebd03828910a0c0190N.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2700 2252 6197867738e3f4ebd03828910a0c0190N.exe 30 PID 2252 wrote to memory of 2700 2252 6197867738e3f4ebd03828910a0c0190N.exe 30 PID 2252 wrote to memory of 2700 2252 6197867738e3f4ebd03828910a0c0190N.exe 30 PID 2252 wrote to memory of 2700 2252 6197867738e3f4ebd03828910a0c0190N.exe 30 PID 2252 wrote to memory of 2600 2252 6197867738e3f4ebd03828910a0c0190N.exe 32 PID 2252 wrote to memory of 2600 2252 6197867738e3f4ebd03828910a0c0190N.exe 32 PID 2252 wrote to memory of 2600 2252 6197867738e3f4ebd03828910a0c0190N.exe 32 PID 2252 wrote to memory of 2600 2252 6197867738e3f4ebd03828910a0c0190N.exe 32 PID 2600 wrote to memory of 3040 2600 cmd.exe 34 PID 2600 wrote to memory of 3040 2600 cmd.exe 34 PID 2600 wrote to memory of 3040 2600 cmd.exe 34 PID 2600 wrote to memory of 3040 2600 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\6197867738e3f4ebd03828910a0c0190N.exe"C:\Users\Admin\AppData\Local\Temp\6197867738e3f4ebd03828910a0c0190N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2700
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\6197867738e3f4ebd03828910a0c0190N.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3040
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5193f725e32dc0ba57559ee8a7969a470
SHA109fb66a26f3c0d323b688c6bc3a456660b8d578a
SHA256467c8c2f935279f7b7d536fe6fe48938f3d516b0e614f79d2c4fd85649ea31de
SHA51279993e2ce601c7a8adbdbfb836be6a0fe86aae558b2554c4c5751a1383c20a87d3a0f8e55eabf071347ed10967e31cead5a774a1001ee391eaafb49633d93a8c