Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-09-2024 08:29
Static task
static1
Behavioral task
behavioral1
Sample
8d8d8676df8dd42cc243c03db9179edcff4c8afa139ba0c27d0595e8c98e69b4N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8d8d8676df8dd42cc243c03db9179edcff4c8afa139ba0c27d0595e8c98e69b4N.exe
Resource
win10v2004-20240802-en
General
-
Target
8d8d8676df8dd42cc243c03db9179edcff4c8afa139ba0c27d0595e8c98e69b4N.exe
-
Size
35KB
-
MD5
b8b8f541f72021da143f382df12ca500
-
SHA1
dd0e36e759fb51339a9abcfc161c4dc988bd0f24
-
SHA256
8d8d8676df8dd42cc243c03db9179edcff4c8afa139ba0c27d0595e8c98e69b4
-
SHA512
70a592b8a58395b822b2a1939e4cc0f66c9c6a6f2db69b6b130b2d21d8853b42f205eed53b030eb3c27adccfdce6ad57fd9b4c91db25b1807210eefdd2c63949
-
SSDEEP
768:qwbYGCv4nuEcJpQK4TQbtKvXwXgA9lJJea+yGCJQqeWnAEv2647DW:qwbYP4nuEApQK4TQbtY2gA9DX+ytBOM
Malware Config
Signatures
-
Sakula payload 4 IoCs
resource yara_rule behavioral2/memory/5084-6-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula behavioral2/memory/1852-8-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula behavioral2/memory/5084-13-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula behavioral2/memory/1852-17-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation 8d8d8676df8dd42cc243c03db9179edcff4c8afa139ba0c27d0595e8c98e69b4N.exe -
Executes dropped EXE 1 IoCs
pid Process 1852 MediaCenter.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 8d8d8676df8dd42cc243c03db9179edcff4c8afa139ba0c27d0595e8c98e69b4N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8d8d8676df8dd42cc243c03db9179edcff4c8afa139ba0c27d0595e8c98e69b4N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MediaCenter.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1884 cmd.exe 3196 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3196 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 5084 8d8d8676df8dd42cc243c03db9179edcff4c8afa139ba0c27d0595e8c98e69b4N.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5084 wrote to memory of 1852 5084 8d8d8676df8dd42cc243c03db9179edcff4c8afa139ba0c27d0595e8c98e69b4N.exe 82 PID 5084 wrote to memory of 1852 5084 8d8d8676df8dd42cc243c03db9179edcff4c8afa139ba0c27d0595e8c98e69b4N.exe 82 PID 5084 wrote to memory of 1852 5084 8d8d8676df8dd42cc243c03db9179edcff4c8afa139ba0c27d0595e8c98e69b4N.exe 82 PID 5084 wrote to memory of 1884 5084 8d8d8676df8dd42cc243c03db9179edcff4c8afa139ba0c27d0595e8c98e69b4N.exe 91 PID 5084 wrote to memory of 1884 5084 8d8d8676df8dd42cc243c03db9179edcff4c8afa139ba0c27d0595e8c98e69b4N.exe 91 PID 5084 wrote to memory of 1884 5084 8d8d8676df8dd42cc243c03db9179edcff4c8afa139ba0c27d0595e8c98e69b4N.exe 91 PID 1884 wrote to memory of 3196 1884 cmd.exe 93 PID 1884 wrote to memory of 3196 1884 cmd.exe 93 PID 1884 wrote to memory of 3196 1884 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d8d8676df8dd42cc243c03db9179edcff4c8afa139ba0c27d0595e8c98e69b4N.exe"C:\Users\Admin\AppData\Local\Temp\8d8d8676df8dd42cc243c03db9179edcff4c8afa139ba0c27d0595e8c98e69b4N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1852
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\8d8d8676df8dd42cc243c03db9179edcff4c8afa139ba0c27d0595e8c98e69b4N.exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3196
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD513ae61959dcf6ab7abdc89819adca6e9
SHA14ad8be6e11360a9b1ca588fe8fe44cebc2d068ab
SHA25637289cfebde883fcecfb540e4e56e7accaff08a32d889e40c6951c6b86e13953
SHA512fee5cb9b8de1f6471f40ba6caa15fe5775bbed2180399e9b1831bd90b4c35099ccdb72ccb08ebefab7fa3f7cbc239fcefe7be364c74c18c614a8fe95dd0dd77b