Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
23-10-2024 09:05
Behavioral task
behavioral1
Sample
fa71cf223fe499723cef29d16f867a69fc336f692c2fa97551d144aa5b67830fN.exe
Resource
win7-20241010-en
General
-
Target
fa71cf223fe499723cef29d16f867a69fc336f692c2fa97551d144aa5b67830fN.exe
-
Size
43KB
-
MD5
4c75f758bb822bee0d4c6ce9f45c4770
-
SHA1
2885283230c82b53e4c5501f65f539d1f37d1b90
-
SHA256
fa71cf223fe499723cef29d16f867a69fc336f692c2fa97551d144aa5b67830f
-
SHA512
81ed6ac4eb7e9610e574dca2acfa016a2c7f9fc7905b9d8e09734d84c3008c047390bc0aa33c2045c72d9c7831083ee452dba41013b976046adfb198c2d7c3a0
-
SSDEEP
768:+U9XnKJv8KrtPNxT4oreP7cIK3yQpdk6x8pf9m4P/S0hVvIZiGDZ6RO8nHE8taqH:+U9abrtX4oocIK3yQkaY9z/S0hhy6k8t
Malware Config
Signatures
-
Sakula payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2476-11-0x0000000000980000-0x000000000099F000-memory.dmp family_sakula behavioral1/memory/2808-15-0x0000000000AE0000-0x0000000000AFF000-memory.dmp family_sakula behavioral1/memory/2476-20-0x0000000000980000-0x000000000099F000-memory.dmp family_sakula behavioral1/memory/2808-26-0x0000000000AE0000-0x0000000000AFF000-memory.dmp family_sakula -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2856 cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 2808 MediaCenter.exe -
Loads dropped DLL 2 IoCs
Processes:
fa71cf223fe499723cef29d16f867a69fc336f692c2fa97551d144aa5b67830fN.exepid process 2476 fa71cf223fe499723cef29d16f867a69fc336f692c2fa97551d144aa5b67830fN.exe 2476 fa71cf223fe499723cef29d16f867a69fc336f692c2fa97551d144aa5b67830fN.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
fa71cf223fe499723cef29d16f867a69fc336f692c2fa97551d144aa5b67830fN.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" fa71cf223fe499723cef29d16f867a69fc336f692c2fa97551d144aa5b67830fN.exe -
Processes:
resource yara_rule behavioral1/memory/2476-0-0x0000000000980000-0x000000000099F000-memory.dmp upx \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe upx behavioral1/memory/2476-8-0x00000000001E0000-0x00000000001FF000-memory.dmp upx behavioral1/memory/2476-11-0x0000000000980000-0x000000000099F000-memory.dmp upx behavioral1/memory/2808-15-0x0000000000AE0000-0x0000000000AFF000-memory.dmp upx behavioral1/memory/2476-20-0x0000000000980000-0x000000000099F000-memory.dmp upx behavioral1/memory/2808-26-0x0000000000AE0000-0x0000000000AFF000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
fa71cf223fe499723cef29d16f867a69fc336f692c2fa97551d144aa5b67830fN.execmd.exePING.EXEMediaCenter.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fa71cf223fe499723cef29d16f867a69fc336f692c2fa97551d144aa5b67830fN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MediaCenter.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
cmd.exePING.EXEpid process 2856 cmd.exe 784 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
fa71cf223fe499723cef29d16f867a69fc336f692c2fa97551d144aa5b67830fN.exedescription pid process Token: SeIncBasePriorityPrivilege 2476 fa71cf223fe499723cef29d16f867a69fc336f692c2fa97551d144aa5b67830fN.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
fa71cf223fe499723cef29d16f867a69fc336f692c2fa97551d144aa5b67830fN.execmd.exedescription pid process target process PID 2476 wrote to memory of 2808 2476 fa71cf223fe499723cef29d16f867a69fc336f692c2fa97551d144aa5b67830fN.exe MediaCenter.exe PID 2476 wrote to memory of 2808 2476 fa71cf223fe499723cef29d16f867a69fc336f692c2fa97551d144aa5b67830fN.exe MediaCenter.exe PID 2476 wrote to memory of 2808 2476 fa71cf223fe499723cef29d16f867a69fc336f692c2fa97551d144aa5b67830fN.exe MediaCenter.exe PID 2476 wrote to memory of 2808 2476 fa71cf223fe499723cef29d16f867a69fc336f692c2fa97551d144aa5b67830fN.exe MediaCenter.exe PID 2476 wrote to memory of 2856 2476 fa71cf223fe499723cef29d16f867a69fc336f692c2fa97551d144aa5b67830fN.exe cmd.exe PID 2476 wrote to memory of 2856 2476 fa71cf223fe499723cef29d16f867a69fc336f692c2fa97551d144aa5b67830fN.exe cmd.exe PID 2476 wrote to memory of 2856 2476 fa71cf223fe499723cef29d16f867a69fc336f692c2fa97551d144aa5b67830fN.exe cmd.exe PID 2476 wrote to memory of 2856 2476 fa71cf223fe499723cef29d16f867a69fc336f692c2fa97551d144aa5b67830fN.exe cmd.exe PID 2856 wrote to memory of 784 2856 cmd.exe PING.EXE PID 2856 wrote to memory of 784 2856 cmd.exe PING.EXE PID 2856 wrote to memory of 784 2856 cmd.exe PING.EXE PID 2856 wrote to memory of 784 2856 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa71cf223fe499723cef29d16f867a69fc336f692c2fa97551d144aa5b67830fN.exe"C:\Users\Admin\AppData\Local\Temp\fa71cf223fe499723cef29d16f867a69fc336f692c2fa97551d144aa5b67830fN.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2808
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\fa71cf223fe499723cef29d16f867a69fc336f692c2fa97551d144aa5b67830fN.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:784
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD52f57d0031ab433c51cd11fcffc8457fe
SHA1f39b91b0781f509fa908afed875a8f3974da5bc8
SHA256acfa0b343a4fd440c54e53c237cb6add40ce5db9bc763084b2e6acaeecd18dad
SHA5122c59244953e93eac60cd5fe4d079ec31ffe2031bc92169a6ec402ec44bb27b28979bfb7d9491712549b45daccc13ba759171d8de0d2722c52dae45ee03f437e5