Analysis
-
max time kernel
30s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 10:55
Static task
static1
Behavioral task
behavioral1
Sample
c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51.exe
Resource
win10v2004-20241007-en
General
-
Target
c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51.exe
-
Size
35KB
-
MD5
4044e6ccd94d39f39b99a745b6005a47
-
SHA1
20279ba7472eb2d5670d2a60767581a9915d1fdf
-
SHA256
c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51
-
SHA512
69e6ea8fdfe2d20e6832f460854f90d38daa9763e021c8ef6af21df6add93b0cc577a70f36016b62d339ca772914aa5fdfcacfffa5fe92608a2cba437bd73244
-
SSDEEP
768:lwbYGCv4nuEcJpQK4TQbtKvXwXgA9lJJea+yGCJQqeWnAEv2647DD:lwbYP4nuEApQK4TQbtY2gA9DX+ytBOx
Malware Config
Signatures
-
Sakula family
-
Sakula payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/1080-5-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula behavioral2/memory/3448-7-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula behavioral2/memory/1080-12-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula behavioral2/memory/3448-17-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula -
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 3448 MediaCenter.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51.exeMediaCenter.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MediaCenter.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
PING.EXEcmd.exepid process 1732 PING.EXE 2348 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51.exedescription pid process Token: SeIncBasePriorityPrivilege 1080 c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51.exedescription pid process target process PID 1080 wrote to memory of 3448 1080 c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51.exe MediaCenter.exe PID 1080 wrote to memory of 3448 1080 c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51.exe MediaCenter.exe PID 1080 wrote to memory of 3448 1080 c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51.exe MediaCenter.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51.exe"C:\Users\Admin\AppData\Local\Temp\c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3448
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51.exe"2⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2348 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1732
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD5982528c03d15e2d89ac05c9bd1098cc8
SHA1f2c1483108147e61e54394f54ded615f19bcce7a
SHA25682b19f9ef5baae0f69da4ce60801b530089c3e0b5ea9ed0ef745ce20d7de2389
SHA51265f0c9e2fbd70b49784686469a1a5672bd8f3a8aac0211ae17c9ee25a127a6f2785a0f11598af746c58eca9c5739eb3d04e2481f7b06dc2468d501affb4acad6