Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 10:55
Static task
static1
Behavioral task
behavioral1
Sample
c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51.exe
Resource
win10v2004-20241007-en
General
-
Target
c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51.exe
-
Size
35KB
-
MD5
4044e6ccd94d39f39b99a745b6005a47
-
SHA1
20279ba7472eb2d5670d2a60767581a9915d1fdf
-
SHA256
c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51
-
SHA512
69e6ea8fdfe2d20e6832f460854f90d38daa9763e021c8ef6af21df6add93b0cc577a70f36016b62d339ca772914aa5fdfcacfffa5fe92608a2cba437bd73244
-
SSDEEP
768:lwbYGCv4nuEcJpQK4TQbtKvXwXgA9lJJea+yGCJQqeWnAEv2647DD:lwbYP4nuEApQK4TQbtY2gA9DX+ytBOx
Malware Config
Signatures
-
Sakula family
-
Sakula payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2244-11-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula behavioral1/memory/2128-12-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula behavioral1/memory/2244-15-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula behavioral1/memory/2128-22-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula behavioral1/memory/2244-28-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2888 cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 2244 MediaCenter.exe -
Loads dropped DLL 2 IoCs
Processes:
c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51.exepid process 2128 c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51.exe 2128 c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.exePING.EXEMediaCenter.exec8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MediaCenter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
PING.EXEcmd.exepid process 2644 PING.EXE 2888 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51.exedescription pid process Token: SeIncBasePriorityPrivilege 2128 c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51.execmd.exedescription pid process target process PID 2128 wrote to memory of 2244 2128 c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51.exe MediaCenter.exe PID 2128 wrote to memory of 2244 2128 c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51.exe MediaCenter.exe PID 2128 wrote to memory of 2244 2128 c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51.exe MediaCenter.exe PID 2128 wrote to memory of 2244 2128 c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51.exe MediaCenter.exe PID 2128 wrote to memory of 2888 2128 c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51.exe cmd.exe PID 2128 wrote to memory of 2888 2128 c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51.exe cmd.exe PID 2128 wrote to memory of 2888 2128 c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51.exe cmd.exe PID 2128 wrote to memory of 2888 2128 c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51.exe cmd.exe PID 2888 wrote to memory of 2644 2888 cmd.exe PING.EXE PID 2888 wrote to memory of 2644 2888 cmd.exe PING.EXE PID 2888 wrote to memory of 2644 2888 cmd.exe PING.EXE PID 2888 wrote to memory of 2644 2888 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51.exe"C:\Users\Admin\AppData\Local\Temp\c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2244
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2644
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD5eb6cfe8fba073f320cd523ad33da19db
SHA1c704b2a2de6ffbc4a0c9103d86ae6a4acda967b6
SHA256c68a75ceab71321cfe7ad17ac6040c1264bb525101ee71c65f048914c2d85a3d
SHA512e288cddc466e12b340d8974c08ff6968ba3850404488f63f11a0890bee4add8c3f7132a7355861815ea8b49afdfb60abbf631cdf263069851ae225501adca5d5