Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 04:21
Static task
static1
Behavioral task
behavioral1
Sample
d3d1fe36737a9d3f86eb721aedafe8413cac24d1fe4db0fd24b36b296cadfa73.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
d3d1fe36737a9d3f86eb721aedafe8413cac24d1fe4db0fd24b36b296cadfa73.exe
Resource
win10v2004-20241007-en
General
-
Target
d3d1fe36737a9d3f86eb721aedafe8413cac24d1fe4db0fd24b36b296cadfa73.exe
-
Size
35KB
-
MD5
366d6691f018b79df5260496cbe792d6
-
SHA1
94ad693b7e2808fb82c4b30d4482d9c8989e2a07
-
SHA256
d3d1fe36737a9d3f86eb721aedafe8413cac24d1fe4db0fd24b36b296cadfa73
-
SHA512
c6d6f15a697cee654ab901a2100c21b937d63068f3440c5b44e8957a03ad28719c3f085dc4a6ae4cda18f9c993242d4a58796f460954d852ba7d859b6cc90193
-
SSDEEP
768:lwbYGCv4nuEcJpQK4TQbtKvXwXgA9lJJea+yGCJQqeWnAEv2647Dc:lwbYP4nuEApQK4TQbtY2gA9DX+ytBO6
Malware Config
Signatures
-
Sakula family
-
Sakula payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/1284-6-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula behavioral2/memory/3664-8-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula behavioral2/memory/1284-13-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula behavioral2/memory/3664-17-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
d3d1fe36737a9d3f86eb721aedafe8413cac24d1fe4db0fd24b36b296cadfa73.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation d3d1fe36737a9d3f86eb721aedafe8413cac24d1fe4db0fd24b36b296cadfa73.exe -
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid Process 3664 MediaCenter.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
d3d1fe36737a9d3f86eb721aedafe8413cac24d1fe4db0fd24b36b296cadfa73.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" d3d1fe36737a9d3f86eb721aedafe8413cac24d1fe4db0fd24b36b296cadfa73.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
d3d1fe36737a9d3f86eb721aedafe8413cac24d1fe4db0fd24b36b296cadfa73.exeMediaCenter.execmd.exePING.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d3d1fe36737a9d3f86eb721aedafe8413cac24d1fe4db0fd24b36b296cadfa73.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MediaCenter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
cmd.exePING.EXEpid Process 1876 cmd.exe 1076 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
d3d1fe36737a9d3f86eb721aedafe8413cac24d1fe4db0fd24b36b296cadfa73.exedescription pid Process Token: SeIncBasePriorityPrivilege 1284 d3d1fe36737a9d3f86eb721aedafe8413cac24d1fe4db0fd24b36b296cadfa73.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
d3d1fe36737a9d3f86eb721aedafe8413cac24d1fe4db0fd24b36b296cadfa73.execmd.exedescription pid Process procid_target PID 1284 wrote to memory of 3664 1284 d3d1fe36737a9d3f86eb721aedafe8413cac24d1fe4db0fd24b36b296cadfa73.exe 82 PID 1284 wrote to memory of 3664 1284 d3d1fe36737a9d3f86eb721aedafe8413cac24d1fe4db0fd24b36b296cadfa73.exe 82 PID 1284 wrote to memory of 3664 1284 d3d1fe36737a9d3f86eb721aedafe8413cac24d1fe4db0fd24b36b296cadfa73.exe 82 PID 1284 wrote to memory of 1876 1284 d3d1fe36737a9d3f86eb721aedafe8413cac24d1fe4db0fd24b36b296cadfa73.exe 91 PID 1284 wrote to memory of 1876 1284 d3d1fe36737a9d3f86eb721aedafe8413cac24d1fe4db0fd24b36b296cadfa73.exe 91 PID 1284 wrote to memory of 1876 1284 d3d1fe36737a9d3f86eb721aedafe8413cac24d1fe4db0fd24b36b296cadfa73.exe 91 PID 1876 wrote to memory of 1076 1876 cmd.exe 93 PID 1876 wrote to memory of 1076 1876 cmd.exe 93 PID 1876 wrote to memory of 1076 1876 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3d1fe36737a9d3f86eb721aedafe8413cac24d1fe4db0fd24b36b296cadfa73.exe"C:\Users\Admin\AppData\Local\Temp\d3d1fe36737a9d3f86eb721aedafe8413cac24d1fe4db0fd24b36b296cadfa73.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3664
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\d3d1fe36737a9d3f86eb721aedafe8413cac24d1fe4db0fd24b36b296cadfa73.exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1076
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD58d1670f2b07bffe308d55fddaade5649
SHA158ea3b8110df0f52385a917f7a1deab43f97fe19
SHA256bf171ec727fb2ec8ce0b8e913f8f0241751d3b9f10574ecfbcef42d0831fa432
SHA512cd6fa1ef20f78966d1b7d7152d76d976b1c73a8579f9dd8e891aca12ff54617b839b72cda2d9132a1a9a96fb2e8cdbf6acba1d6119d1dd16ae28610fdcdbb918