Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 10:51
Static task
static1
Behavioral task
behavioral1
Sample
c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51.exe
Resource
win10v2004-20241007-en
General
-
Target
c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51.exe
-
Size
35KB
-
MD5
4044e6ccd94d39f39b99a745b6005a47
-
SHA1
20279ba7472eb2d5670d2a60767581a9915d1fdf
-
SHA256
c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51
-
SHA512
69e6ea8fdfe2d20e6832f460854f90d38daa9763e021c8ef6af21df6add93b0cc577a70f36016b62d339ca772914aa5fdfcacfffa5fe92608a2cba437bd73244
-
SSDEEP
768:lwbYGCv4nuEcJpQK4TQbtKvXwXgA9lJJea+yGCJQqeWnAEv2647DD:lwbYP4nuEApQK4TQbtY2gA9DX+ytBOx
Malware Config
Signatures
-
Sakula family
-
Sakula payload 4 IoCs
resource yara_rule behavioral2/memory/2968-5-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula behavioral2/memory/224-7-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula behavioral2/memory/2968-13-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula behavioral2/memory/224-18-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51.exe -
Executes dropped EXE 1 IoCs
pid Process 224 MediaCenter.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MediaCenter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1072 cmd.exe 3760 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3760 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2968 c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2968 wrote to memory of 224 2968 c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51.exe 82 PID 2968 wrote to memory of 224 2968 c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51.exe 82 PID 2968 wrote to memory of 224 2968 c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51.exe 82 PID 2968 wrote to memory of 1072 2968 c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51.exe 91 PID 2968 wrote to memory of 1072 2968 c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51.exe 91 PID 2968 wrote to memory of 1072 2968 c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51.exe 91 PID 1072 wrote to memory of 3760 1072 cmd.exe 93 PID 1072 wrote to memory of 3760 1072 cmd.exe 93 PID 1072 wrote to memory of 3760 1072 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51.exe"C:\Users\Admin\AppData\Local\Temp\c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:224
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\c8d256633a89c310ecbc4288105534f21d4f1df31b08da061cd9e47bdf724a51.exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3760
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD538b1b4632b31c734606a9dc60b5afd16
SHA1f25525e8b79981632a22a688ee77d0146524db3f
SHA25606129ffa46f5b0be7798de3478c207e8f22423e6a471baded26c7b3981dc3dbe
SHA5120419bd30d50c956af3c3966b8cf519146129f07cdfe4b1ce1e7031fe4f60d1d211b7e189c3ee8614ca6dc29db2369d7e42658d3f7d39f318a1ba696241a3bcbe