Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-11-2024 03:50
Behavioral task
behavioral1
Sample
e914592cec92a99c0d8b609ad86feee0500c54ebe3b87f7685196b15dc77a618.exe
Resource
win7-20240903-en
General
-
Target
e914592cec92a99c0d8b609ad86feee0500c54ebe3b87f7685196b15dc77a618.exe
-
Size
41KB
-
MD5
3785214b8d43efc64437fc2fdb72e9d9
-
SHA1
7159aa8f129bf5aa32e3357130a622ffee106a2b
-
SHA256
e914592cec92a99c0d8b609ad86feee0500c54ebe3b87f7685196b15dc77a618
-
SHA512
78e5aa4d18039fb91606cb2b2fd17f3349c4a070efd71d3b0dc678940c1e4e338c891f18939441e7311e67934f28646614a8919947f330aa41c147da63f3ca2f
-
SSDEEP
768:9zpVJi5kPTIukEYpcHOZ6rFSBZxkXNVkSXtfgn3JkcBwQoabJF7nbcuyD7Ue:N/JKiMLE9bOq5fgn6Ozoaz7nouy8e
Malware Config
Extracted
sakula
www.polarroute.com
Signatures
-
Sakula family
-
Sakula payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2184-7-0x0000000000400000-0x000000000041E000-memory.dmp family_sakula behavioral1/memory/2232-8-0x0000000000400000-0x000000000041E000-memory.dmp family_sakula behavioral1/memory/2184-10-0x0000000000400000-0x000000000041E000-memory.dmp family_sakula behavioral1/memory/2232-16-0x0000000000400000-0x000000000041E000-memory.dmp family_sakula behavioral1/memory/2184-24-0x0000000000400000-0x000000000041E000-memory.dmp family_sakula -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2684 cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 2184 MediaCenter.exe -
Loads dropped DLL 1 IoCs
Processes:
e914592cec92a99c0d8b609ad86feee0500c54ebe3b87f7685196b15dc77a618.exepid process 2232 e914592cec92a99c0d8b609ad86feee0500c54ebe3b87f7685196b15dc77a618.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
e914592cec92a99c0d8b609ad86feee0500c54ebe3b87f7685196b15dc77a618.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" e914592cec92a99c0d8b609ad86feee0500c54ebe3b87f7685196b15dc77a618.exe -
Processes:
resource yara_rule behavioral1/memory/2232-0-0x0000000000400000-0x000000000041E000-memory.dmp upx \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe upx behavioral1/memory/2232-4-0x0000000000230000-0x000000000024E000-memory.dmp upx behavioral1/memory/2184-7-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2232-8-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2184-10-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2232-16-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2184-24-0x0000000000400000-0x000000000041E000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
PING.EXEe914592cec92a99c0d8b609ad86feee0500c54ebe3b87f7685196b15dc77a618.exeMediaCenter.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e914592cec92a99c0d8b609ad86feee0500c54ebe3b87f7685196b15dc77a618.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MediaCenter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
cmd.exePING.EXEpid process 2684 cmd.exe 2928 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
e914592cec92a99c0d8b609ad86feee0500c54ebe3b87f7685196b15dc77a618.exedescription pid process Token: SeIncBasePriorityPrivilege 2232 e914592cec92a99c0d8b609ad86feee0500c54ebe3b87f7685196b15dc77a618.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
e914592cec92a99c0d8b609ad86feee0500c54ebe3b87f7685196b15dc77a618.execmd.exedescription pid process target process PID 2232 wrote to memory of 2184 2232 e914592cec92a99c0d8b609ad86feee0500c54ebe3b87f7685196b15dc77a618.exe MediaCenter.exe PID 2232 wrote to memory of 2184 2232 e914592cec92a99c0d8b609ad86feee0500c54ebe3b87f7685196b15dc77a618.exe MediaCenter.exe PID 2232 wrote to memory of 2184 2232 e914592cec92a99c0d8b609ad86feee0500c54ebe3b87f7685196b15dc77a618.exe MediaCenter.exe PID 2232 wrote to memory of 2184 2232 e914592cec92a99c0d8b609ad86feee0500c54ebe3b87f7685196b15dc77a618.exe MediaCenter.exe PID 2232 wrote to memory of 2684 2232 e914592cec92a99c0d8b609ad86feee0500c54ebe3b87f7685196b15dc77a618.exe cmd.exe PID 2232 wrote to memory of 2684 2232 e914592cec92a99c0d8b609ad86feee0500c54ebe3b87f7685196b15dc77a618.exe cmd.exe PID 2232 wrote to memory of 2684 2232 e914592cec92a99c0d8b609ad86feee0500c54ebe3b87f7685196b15dc77a618.exe cmd.exe PID 2232 wrote to memory of 2684 2232 e914592cec92a99c0d8b609ad86feee0500c54ebe3b87f7685196b15dc77a618.exe cmd.exe PID 2684 wrote to memory of 2928 2684 cmd.exe PING.EXE PID 2684 wrote to memory of 2928 2684 cmd.exe PING.EXE PID 2684 wrote to memory of 2928 2684 cmd.exe PING.EXE PID 2684 wrote to memory of 2928 2684 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\e914592cec92a99c0d8b609ad86feee0500c54ebe3b87f7685196b15dc77a618.exe"C:\Users\Admin\AppData\Local\Temp\e914592cec92a99c0d8b609ad86feee0500c54ebe3b87f7685196b15dc77a618.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2184
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\e914592cec92a99c0d8b609ad86feee0500c54ebe3b87f7685196b15dc77a618.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2928
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD5278480c32c46681aa67341d79c3861c3
SHA196fd3c71197b456fb51b80d574157292ce704d94
SHA256512acba9de3df379cb5ca71624789185d4042b627eecf2d8e8f41c6bc0deb515
SHA5121b84ee351e0812039e725f8c34bd91b263158c4218eefb34adf02abf3430c27ad1b417da6fefe810640c73052638dc623001aaaf3a389e420c06e773cc67a7c0