Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
18-11-2024 16:34
Static task
static1
Behavioral task
behavioral1
Sample
96b6f4b16af8494068db6c98c9a161eef303863d5a66a887fb3392ea7d225316.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
96b6f4b16af8494068db6c98c9a161eef303863d5a66a887fb3392ea7d225316.exe
Resource
win10v2004-20241007-en
General
-
Target
96b6f4b16af8494068db6c98c9a161eef303863d5a66a887fb3392ea7d225316.exe
-
Size
58KB
-
MD5
13524573226d6ad2eaf5aadf302c6e5d
-
SHA1
5b00f9dc1a071fd2af3e5de90417b7e5eb45eba1
-
SHA256
96b6f4b16af8494068db6c98c9a161eef303863d5a66a887fb3392ea7d225316
-
SHA512
fe166fd0a50e50c26db39f7f992b148a225b27cc8c4e9fabf35bea734643a58003d1b4b8f191de60cb62da0dc4b3bb410642e7a909be1acf9a93364c28e08ad2
-
SSDEEP
1536:iZioIoCwbYP4nuEApQK4TQbtY2gA9DX+ytBO8c3G3eTJ/g:iEoIlwIguEA4c5DgA9DOyq0eFI
Malware Config
Signatures
-
Sakula family
-
Sakula payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1956-11-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula behavioral1/memory/1616-14-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula behavioral1/memory/1956-20-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula behavioral1/memory/1616-26-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2892 cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 1616 MediaCenter.exe -
Loads dropped DLL 2 IoCs
Processes:
96b6f4b16af8494068db6c98c9a161eef303863d5a66a887fb3392ea7d225316.exepid process 1956 96b6f4b16af8494068db6c98c9a161eef303863d5a66a887fb3392ea7d225316.exe 1956 96b6f4b16af8494068db6c98c9a161eef303863d5a66a887fb3392ea7d225316.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
96b6f4b16af8494068db6c98c9a161eef303863d5a66a887fb3392ea7d225316.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 96b6f4b16af8494068db6c98c9a161eef303863d5a66a887fb3392ea7d225316.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
96b6f4b16af8494068db6c98c9a161eef303863d5a66a887fb3392ea7d225316.execmd.exePING.EXEMediaCenter.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96b6f4b16af8494068db6c98c9a161eef303863d5a66a887fb3392ea7d225316.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MediaCenter.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
cmd.exePING.EXEpid process 2892 cmd.exe 2920 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
96b6f4b16af8494068db6c98c9a161eef303863d5a66a887fb3392ea7d225316.exedescription pid process Token: SeIncBasePriorityPrivilege 1956 96b6f4b16af8494068db6c98c9a161eef303863d5a66a887fb3392ea7d225316.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
96b6f4b16af8494068db6c98c9a161eef303863d5a66a887fb3392ea7d225316.execmd.exedescription pid process target process PID 1956 wrote to memory of 1616 1956 96b6f4b16af8494068db6c98c9a161eef303863d5a66a887fb3392ea7d225316.exe MediaCenter.exe PID 1956 wrote to memory of 1616 1956 96b6f4b16af8494068db6c98c9a161eef303863d5a66a887fb3392ea7d225316.exe MediaCenter.exe PID 1956 wrote to memory of 1616 1956 96b6f4b16af8494068db6c98c9a161eef303863d5a66a887fb3392ea7d225316.exe MediaCenter.exe PID 1956 wrote to memory of 1616 1956 96b6f4b16af8494068db6c98c9a161eef303863d5a66a887fb3392ea7d225316.exe MediaCenter.exe PID 1956 wrote to memory of 2892 1956 96b6f4b16af8494068db6c98c9a161eef303863d5a66a887fb3392ea7d225316.exe cmd.exe PID 1956 wrote to memory of 2892 1956 96b6f4b16af8494068db6c98c9a161eef303863d5a66a887fb3392ea7d225316.exe cmd.exe PID 1956 wrote to memory of 2892 1956 96b6f4b16af8494068db6c98c9a161eef303863d5a66a887fb3392ea7d225316.exe cmd.exe PID 1956 wrote to memory of 2892 1956 96b6f4b16af8494068db6c98c9a161eef303863d5a66a887fb3392ea7d225316.exe cmd.exe PID 2892 wrote to memory of 2920 2892 cmd.exe PING.EXE PID 2892 wrote to memory of 2920 2892 cmd.exe PING.EXE PID 2892 wrote to memory of 2920 2892 cmd.exe PING.EXE PID 2892 wrote to memory of 2920 2892 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\96b6f4b16af8494068db6c98c9a161eef303863d5a66a887fb3392ea7d225316.exe"C:\Users\Admin\AppData\Local\Temp\96b6f4b16af8494068db6c98c9a161eef303863d5a66a887fb3392ea7d225316.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1616
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\96b6f4b16af8494068db6c98c9a161eef303863d5a66a887fb3392ea7d225316.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2920
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58KB
MD560af4f251aed5f7d83696039d1034871
SHA11af29254592056ea6cde5ae8d2340dc589d84354
SHA256cad967c48d0e47329b901adbc1f68c7545a6fe96b2be4a9c377e4231fe7ec123
SHA5126ea74cbdf958a067caf3987211630af8d9c5bd39846b472a2e62f0b5f51381a4d86d2289252e6e13f82a06e57bb6383abf70526699f69f5479b7cc0b368415ab