Analysis
-
max time kernel
140s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 00:09
Behavioral task
behavioral1
Sample
864a1813d74482211a90b8de9634fe6a4a5dcbf02dafdd29a23e0f981a189dc4.exe
Resource
win7-20240903-en
General
-
Target
864a1813d74482211a90b8de9634fe6a4a5dcbf02dafdd29a23e0f981a189dc4.exe
-
Size
63KB
-
MD5
52410702bab9bf2fb69dca88ed833795
-
SHA1
b422575bc6bbe91add4d446e3c994fc82388de9c
-
SHA256
864a1813d74482211a90b8de9634fe6a4a5dcbf02dafdd29a23e0f981a189dc4
-
SHA512
c5d5878ece2a282b48d9693ac7cc620e5766eea08a7d1a7eab6f06ded9a446cb1d47a42b2c6301ee8cd063dbdae87746b9cb2e34699141ae7e674891e6aad306
-
SSDEEP
1536:zoxBP0D61Oj3+5FdOa52C8pdo95j6hZ2MzNDCkrI:0PPUj3+5FMIn8To94wa7I
Malware Config
Extracted
sakula
www.polarroute.com
Signatures
-
Sakula family
-
Sakula payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/1212-5-0x0000000000400000-0x0000000000424000-memory.dmp family_sakula behavioral2/memory/3436-7-0x0000000000400000-0x0000000000424000-memory.dmp family_sakula behavioral2/memory/1212-13-0x0000000000400000-0x0000000000424000-memory.dmp family_sakula behavioral2/memory/3436-18-0x0000000000400000-0x0000000000424000-memory.dmp family_sakula -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
864a1813d74482211a90b8de9634fe6a4a5dcbf02dafdd29a23e0f981a189dc4.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 864a1813d74482211a90b8de9634fe6a4a5dcbf02dafdd29a23e0f981a189dc4.exe -
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 3436 MediaCenter.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
864a1813d74482211a90b8de9634fe6a4a5dcbf02dafdd29a23e0f981a189dc4.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 864a1813d74482211a90b8de9634fe6a4a5dcbf02dafdd29a23e0f981a189dc4.exe -
Processes:
resource yara_rule behavioral2/memory/1212-0-0x0000000000400000-0x0000000000424000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe upx behavioral2/memory/1212-5-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/3436-7-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/1212-13-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/3436-18-0x0000000000400000-0x0000000000424000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.exePING.EXE864a1813d74482211a90b8de9634fe6a4a5dcbf02dafdd29a23e0f981a189dc4.exeMediaCenter.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 864a1813d74482211a90b8de9634fe6a4a5dcbf02dafdd29a23e0f981a189dc4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MediaCenter.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
cmd.exePING.EXEpid process 1764 cmd.exe 4092 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
864a1813d74482211a90b8de9634fe6a4a5dcbf02dafdd29a23e0f981a189dc4.exedescription pid process Token: SeIncBasePriorityPrivilege 1212 864a1813d74482211a90b8de9634fe6a4a5dcbf02dafdd29a23e0f981a189dc4.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
864a1813d74482211a90b8de9634fe6a4a5dcbf02dafdd29a23e0f981a189dc4.execmd.exedescription pid process target process PID 1212 wrote to memory of 3436 1212 864a1813d74482211a90b8de9634fe6a4a5dcbf02dafdd29a23e0f981a189dc4.exe MediaCenter.exe PID 1212 wrote to memory of 3436 1212 864a1813d74482211a90b8de9634fe6a4a5dcbf02dafdd29a23e0f981a189dc4.exe MediaCenter.exe PID 1212 wrote to memory of 3436 1212 864a1813d74482211a90b8de9634fe6a4a5dcbf02dafdd29a23e0f981a189dc4.exe MediaCenter.exe PID 1212 wrote to memory of 1764 1212 864a1813d74482211a90b8de9634fe6a4a5dcbf02dafdd29a23e0f981a189dc4.exe cmd.exe PID 1212 wrote to memory of 1764 1212 864a1813d74482211a90b8de9634fe6a4a5dcbf02dafdd29a23e0f981a189dc4.exe cmd.exe PID 1212 wrote to memory of 1764 1212 864a1813d74482211a90b8de9634fe6a4a5dcbf02dafdd29a23e0f981a189dc4.exe cmd.exe PID 1764 wrote to memory of 4092 1764 cmd.exe PING.EXE PID 1764 wrote to memory of 4092 1764 cmd.exe PING.EXE PID 1764 wrote to memory of 4092 1764 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\864a1813d74482211a90b8de9634fe6a4a5dcbf02dafdd29a23e0f981a189dc4.exe"C:\Users\Admin\AppData\Local\Temp\864a1813d74482211a90b8de9634fe6a4a5dcbf02dafdd29a23e0f981a189dc4.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3436
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\864a1813d74482211a90b8de9634fe6a4a5dcbf02dafdd29a23e0f981a189dc4.exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4092
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD5f98c8e1c9b31c2302d279f8c62f14224
SHA1e0d37f9844946864638e19f1a402a6e8f9c0e0e3
SHA25649780b949cd138da9703f005704f55b39af122d0349d7d9c8ba728addeeb57b5
SHA512d46a2418d27c7ff7e920451668e8db4d908e0b35dd977cf8f1e1c5adc39a679d70a729b4efb411db7b1a162e748bec5d2b914cd91a3a2fd60011612d4ead0b87