Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-09-2024 19:59
Behavioral task
behavioral1
Sample
274d9fc9a589e5bc6fe6ebd2ab94f35db74b84b8d7ba746332e11e98497f87c3.exe
Resource
win7-20240903-en
General
-
Target
274d9fc9a589e5bc6fe6ebd2ab94f35db74b84b8d7ba746332e11e98497f87c3.exe
-
Size
43KB
-
MD5
abe57f897e0be11d231c9088c7bbad09
-
SHA1
11144451f8a5984e213640ae3b0adf2199995f76
-
SHA256
274d9fc9a589e5bc6fe6ebd2ab94f35db74b84b8d7ba746332e11e98497f87c3
-
SHA512
b37f3dcbe2d4743be71907ee938ed493dcd8cdacfe3f180ec524d9042978c270aa52bfd432dc5883c539cb6171088330031a30478093e692f486ed5b7b45eff1
-
SSDEEP
768:+U9XnKJv8KrtPNxT4oreP7cIK3yQpdk6x8pf9m4P/S0hVvIZiGDZ6RO8nHE8taq/:+U9abrtX4oocIK3yQkaY9z/S0hhy6k81
Malware Config
Signatures
-
Sakula payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2908-11-0x00000000013D0000-0x00000000013EF000-memory.dmp family_sakula behavioral1/memory/1400-14-0x0000000001200000-0x000000000121F000-memory.dmp family_sakula behavioral1/memory/2908-22-0x00000000013D0000-0x00000000013EF000-memory.dmp family_sakula behavioral1/memory/1400-28-0x0000000001200000-0x000000000121F000-memory.dmp family_sakula -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 2532 cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid Process 1400 MediaCenter.exe -
Loads dropped DLL 2 IoCs
Processes:
274d9fc9a589e5bc6fe6ebd2ab94f35db74b84b8d7ba746332e11e98497f87c3.exepid Process 2908 274d9fc9a589e5bc6fe6ebd2ab94f35db74b84b8d7ba746332e11e98497f87c3.exe 2908 274d9fc9a589e5bc6fe6ebd2ab94f35db74b84b8d7ba746332e11e98497f87c3.exe -
Processes:
resource yara_rule behavioral1/memory/2908-0-0x00000000013D0000-0x00000000013EF000-memory.dmp upx behavioral1/files/0x0008000000017234-2.dat upx behavioral1/memory/1400-10-0x0000000001200000-0x000000000121F000-memory.dmp upx behavioral1/memory/2908-11-0x00000000013D0000-0x00000000013EF000-memory.dmp upx behavioral1/memory/1400-14-0x0000000001200000-0x000000000121F000-memory.dmp upx behavioral1/memory/2908-22-0x00000000013D0000-0x00000000013EF000-memory.dmp upx behavioral1/memory/1400-28-0x0000000001200000-0x000000000121F000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
274d9fc9a589e5bc6fe6ebd2ab94f35db74b84b8d7ba746332e11e98497f87c3.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 274d9fc9a589e5bc6fe6ebd2ab94f35db74b84b8d7ba746332e11e98497f87c3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
274d9fc9a589e5bc6fe6ebd2ab94f35db74b84b8d7ba746332e11e98497f87c3.execmd.exePING.EXEMediaCenter.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 274d9fc9a589e5bc6fe6ebd2ab94f35db74b84b8d7ba746332e11e98497f87c3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MediaCenter.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
cmd.exePING.EXEpid Process 2532 cmd.exe 3048 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
274d9fc9a589e5bc6fe6ebd2ab94f35db74b84b8d7ba746332e11e98497f87c3.exedescription pid Process Token: SeIncBasePriorityPrivilege 2908 274d9fc9a589e5bc6fe6ebd2ab94f35db74b84b8d7ba746332e11e98497f87c3.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
274d9fc9a589e5bc6fe6ebd2ab94f35db74b84b8d7ba746332e11e98497f87c3.execmd.exedescription pid Process procid_target PID 2908 wrote to memory of 1400 2908 274d9fc9a589e5bc6fe6ebd2ab94f35db74b84b8d7ba746332e11e98497f87c3.exe 30 PID 2908 wrote to memory of 1400 2908 274d9fc9a589e5bc6fe6ebd2ab94f35db74b84b8d7ba746332e11e98497f87c3.exe 30 PID 2908 wrote to memory of 1400 2908 274d9fc9a589e5bc6fe6ebd2ab94f35db74b84b8d7ba746332e11e98497f87c3.exe 30 PID 2908 wrote to memory of 1400 2908 274d9fc9a589e5bc6fe6ebd2ab94f35db74b84b8d7ba746332e11e98497f87c3.exe 30 PID 2908 wrote to memory of 2532 2908 274d9fc9a589e5bc6fe6ebd2ab94f35db74b84b8d7ba746332e11e98497f87c3.exe 32 PID 2908 wrote to memory of 2532 2908 274d9fc9a589e5bc6fe6ebd2ab94f35db74b84b8d7ba746332e11e98497f87c3.exe 32 PID 2908 wrote to memory of 2532 2908 274d9fc9a589e5bc6fe6ebd2ab94f35db74b84b8d7ba746332e11e98497f87c3.exe 32 PID 2908 wrote to memory of 2532 2908 274d9fc9a589e5bc6fe6ebd2ab94f35db74b84b8d7ba746332e11e98497f87c3.exe 32 PID 2532 wrote to memory of 3048 2532 cmd.exe 34 PID 2532 wrote to memory of 3048 2532 cmd.exe 34 PID 2532 wrote to memory of 3048 2532 cmd.exe 34 PID 2532 wrote to memory of 3048 2532 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\274d9fc9a589e5bc6fe6ebd2ab94f35db74b84b8d7ba746332e11e98497f87c3.exe"C:\Users\Admin\AppData\Local\Temp\274d9fc9a589e5bc6fe6ebd2ab94f35db74b84b8d7ba746332e11e98497f87c3.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1400
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\274d9fc9a589e5bc6fe6ebd2ab94f35db74b84b8d7ba746332e11e98497f87c3.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3048
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD5e0f9e85b8b31de6498763f846786c9a9
SHA17271b4743ca088f6362de379b7b3e45b60838fd6
SHA25629f1115255d50d3763f10fffbf5b093facaf68213c880f2945cacb7dab0e4c8d
SHA5123b8771f38c526b444f6609682b7e0ebefb697c0496eb4d8f8296e3a1940ab8291b863f82155fed49b30e2fe3af37a67058271445c70afe1fc198eaf5b4be87ac