Analysis
-
max time kernel
111s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 00:34
Behavioral task
behavioral1
Sample
c783c34aa3234cfb7bb30b1a90749ff0N.exe
Resource
win7-20240729-en
General
-
Target
c783c34aa3234cfb7bb30b1a90749ff0N.exe
-
Size
43KB
-
MD5
c783c34aa3234cfb7bb30b1a90749ff0
-
SHA1
783acbff574420255d0705e20f2424348105791e
-
SHA256
a13f8ba09b767794ce964edfaeb940997b970150f3e8ebf4a1e782d19d757b4c
-
SHA512
f95ca350f23299a3521f63636ce3fa293127a226c8b678ed75fb59178032a51a9a101aab73433f25778e84954540a54647c7d65bf59f42347e7b13f6d051a071
-
SSDEEP
768:+U9XnKJv8KrtPNxT4oreP7cIK3yQpdk6x8pf9m4P/S0hVvIZiGDZ6RO8nHE8taqm:+U9abrtX4oocIK3yQkaY9z/S0hhy6k8A
Malware Config
Signatures
-
Sakula payload 4 IoCs
resource yara_rule behavioral2/memory/2200-6-0x0000000000A60000-0x0000000000A7F000-memory.dmp family_sakula behavioral2/memory/3140-8-0x00000000002E0000-0x00000000002FF000-memory.dmp family_sakula behavioral2/memory/2200-13-0x0000000000A60000-0x0000000000A7F000-memory.dmp family_sakula behavioral2/memory/3140-18-0x00000000002E0000-0x00000000002FF000-memory.dmp family_sakula -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation c783c34aa3234cfb7bb30b1a90749ff0N.exe -
Executes dropped EXE 1 IoCs
pid Process 3140 MediaCenter.exe -
resource yara_rule behavioral2/memory/2200-0-0x0000000000A60000-0x0000000000A7F000-memory.dmp upx behavioral2/files/0x0007000000023445-3.dat upx behavioral2/memory/3140-4-0x00000000002E0000-0x00000000002FF000-memory.dmp upx behavioral2/memory/2200-6-0x0000000000A60000-0x0000000000A7F000-memory.dmp upx behavioral2/memory/3140-8-0x00000000002E0000-0x00000000002FF000-memory.dmp upx behavioral2/memory/2200-13-0x0000000000A60000-0x0000000000A7F000-memory.dmp upx behavioral2/memory/3140-18-0x00000000002E0000-0x00000000002FF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" c783c34aa3234cfb7bb30b1a90749ff0N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c783c34aa3234cfb7bb30b1a90749ff0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MediaCenter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1772 cmd.exe 4136 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4136 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2200 c783c34aa3234cfb7bb30b1a90749ff0N.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2200 wrote to memory of 3140 2200 c783c34aa3234cfb7bb30b1a90749ff0N.exe 83 PID 2200 wrote to memory of 3140 2200 c783c34aa3234cfb7bb30b1a90749ff0N.exe 83 PID 2200 wrote to memory of 3140 2200 c783c34aa3234cfb7bb30b1a90749ff0N.exe 83 PID 2200 wrote to memory of 1772 2200 c783c34aa3234cfb7bb30b1a90749ff0N.exe 96 PID 2200 wrote to memory of 1772 2200 c783c34aa3234cfb7bb30b1a90749ff0N.exe 96 PID 2200 wrote to memory of 1772 2200 c783c34aa3234cfb7bb30b1a90749ff0N.exe 96 PID 1772 wrote to memory of 4136 1772 cmd.exe 98 PID 1772 wrote to memory of 4136 1772 cmd.exe 98 PID 1772 wrote to memory of 4136 1772 cmd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\c783c34aa3234cfb7bb30b1a90749ff0N.exe"C:\Users\Admin\AppData\Local\Temp\c783c34aa3234cfb7bb30b1a90749ff0N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3140
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\c783c34aa3234cfb7bb30b1a90749ff0N.exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4136
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD50e50f498df0ce6aa0cccdb5e83d70b51
SHA17d4997cef79d6939f63cd8fa9ee91bf3910dbe5e
SHA256abf68148501730b97c035d8184a4a7f82ac65d1c5812430aa68997a1d973e050
SHA512227dc916416d698de10d3907906b7e4608645974545c0ad5368be1d76be45ea4fdade79c9b4760b60e8add268a8e1209d6701b9e5c3b30e85f50bd1dfa2a7423