Analysis
-
max time kernel
138s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-10-2024 06:03
Static task
static1
Behavioral task
behavioral1
Sample
e575d4e758b839095a4ea21098e9b937c034d9519822aaf5015873d98f7a042b.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e575d4e758b839095a4ea21098e9b937c034d9519822aaf5015873d98f7a042b.exe
Resource
win10v2004-20241007-en
General
-
Target
e575d4e758b839095a4ea21098e9b937c034d9519822aaf5015873d98f7a042b.exe
-
Size
36KB
-
MD5
ec5dff14299f99ed0f45e729a5936305
-
SHA1
67d31ed97f246e37d11fdd08885bae14e54dc645
-
SHA256
e575d4e758b839095a4ea21098e9b937c034d9519822aaf5015873d98f7a042b
-
SHA512
f00da917a309b6f457af2d0c4ecab4f8e62a7c201ee3d01597ed36c597d0218f7ecadeb7e2c67d17e676d1583bccfd78d32558301806864133083d40defcb6c3
-
SSDEEP
768:EUoD8uJ8b5BoF50YdY+kbntiBgEffLr/vTzQg419sk:QD8uJ65WYnNYX/7zHOsk
Malware Config
Signatures
-
Sakula payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4740-1-0x0000000000A10000-0x0000000000A29000-memory.dmp family_sakula behavioral2/memory/4576-6-0x0000000000C60000-0x0000000000C79000-memory.dmp family_sakula -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
e575d4e758b839095a4ea21098e9b937c034d9519822aaf5015873d98f7a042b.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation e575d4e758b839095a4ea21098e9b937c034d9519822aaf5015873d98f7a042b.exe -
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 4576 MediaCenter.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
e575d4e758b839095a4ea21098e9b937c034d9519822aaf5015873d98f7a042b.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" e575d4e758b839095a4ea21098e9b937c034d9519822aaf5015873d98f7a042b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
MediaCenter.execmd.exePING.EXEe575d4e758b839095a4ea21098e9b937c034d9519822aaf5015873d98f7a042b.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MediaCenter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e575d4e758b839095a4ea21098e9b937c034d9519822aaf5015873d98f7a042b.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
cmd.exePING.EXEpid process 4168 cmd.exe 3512 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
e575d4e758b839095a4ea21098e9b937c034d9519822aaf5015873d98f7a042b.exedescription pid process Token: SeIncBasePriorityPrivilege 4740 e575d4e758b839095a4ea21098e9b937c034d9519822aaf5015873d98f7a042b.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
e575d4e758b839095a4ea21098e9b937c034d9519822aaf5015873d98f7a042b.execmd.exedescription pid process target process PID 4740 wrote to memory of 4576 4740 e575d4e758b839095a4ea21098e9b937c034d9519822aaf5015873d98f7a042b.exe MediaCenter.exe PID 4740 wrote to memory of 4576 4740 e575d4e758b839095a4ea21098e9b937c034d9519822aaf5015873d98f7a042b.exe MediaCenter.exe PID 4740 wrote to memory of 4576 4740 e575d4e758b839095a4ea21098e9b937c034d9519822aaf5015873d98f7a042b.exe MediaCenter.exe PID 4740 wrote to memory of 4168 4740 e575d4e758b839095a4ea21098e9b937c034d9519822aaf5015873d98f7a042b.exe cmd.exe PID 4740 wrote to memory of 4168 4740 e575d4e758b839095a4ea21098e9b937c034d9519822aaf5015873d98f7a042b.exe cmd.exe PID 4740 wrote to memory of 4168 4740 e575d4e758b839095a4ea21098e9b937c034d9519822aaf5015873d98f7a042b.exe cmd.exe PID 4168 wrote to memory of 3512 4168 cmd.exe PING.EXE PID 4168 wrote to memory of 3512 4168 cmd.exe PING.EXE PID 4168 wrote to memory of 3512 4168 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\e575d4e758b839095a4ea21098e9b937c034d9519822aaf5015873d98f7a042b.exe"C:\Users\Admin\AppData\Local\Temp\e575d4e758b839095a4ea21098e9b937c034d9519822aaf5015873d98f7a042b.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4576
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\e575d4e758b839095a4ea21098e9b937c034d9519822aaf5015873d98f7a042b.exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3512
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD56a91997ef91380cc47dff3e80f5f9aa7
SHA126bce07c9ddc9a789749eb34701504e345211868
SHA25684a0ab1e45a687070c02eb57a0a9db06c7f309ff748b11feb74f287389ab904f
SHA5125c7846563316642e77da207e393e91e783d1eb701af364a5bb97c6d704e6a00808c1fdbfd892111208aa01098e42dc056e1e6cdee3f59bf1bc163ea2b9ef2799