Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
02-12-2024 03:42
Behavioral task
behavioral1
Sample
4c0675838d72b46062266721e0af921419bb6dc072a9f84beefdb76ae9424e88.exe
Resource
win7-20241010-en
General
-
Target
4c0675838d72b46062266721e0af921419bb6dc072a9f84beefdb76ae9424e88.exe
-
Size
43KB
-
MD5
a116eaf7cc4c339aadf9f15ce8c8e981
-
SHA1
a11d0e6c90c010c332309c81006f8975fc112301
-
SHA256
4c0675838d72b46062266721e0af921419bb6dc072a9f84beefdb76ae9424e88
-
SHA512
f8d37fb972a55a50012c096028e9967e24c8380a71d79e93f0d310607ea2408aa3e527d0060624faa9c0108bd670ddfc8aaf098af2a363324b9da007c0d4547a
-
SSDEEP
768:+U9XnKJv8KrtPNxT4oreP7cIK3yQpdk6x8pf9m4P/S0hVvIZiGDZ6RO8nHE8taqw:+U9abrtX4oocIK3yQkaY9z/S0hhy6k8q
Malware Config
Signatures
-
Sakula family
-
Sakula payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2084-10-0x0000000001260000-0x000000000127F000-memory.dmp family_sakula behavioral1/memory/2300-14-0x0000000000EB0000-0x0000000000ECF000-memory.dmp family_sakula behavioral1/memory/2084-20-0x0000000001260000-0x000000000127F000-memory.dmp family_sakula behavioral1/memory/2300-25-0x0000000000EB0000-0x0000000000ECF000-memory.dmp family_sakula -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 2220 cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid Process 2300 MediaCenter.exe -
Loads dropped DLL 2 IoCs
Processes:
4c0675838d72b46062266721e0af921419bb6dc072a9f84beefdb76ae9424e88.exepid Process 2084 4c0675838d72b46062266721e0af921419bb6dc072a9f84beefdb76ae9424e88.exe 2084 4c0675838d72b46062266721e0af921419bb6dc072a9f84beefdb76ae9424e88.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
4c0675838d72b46062266721e0af921419bb6dc072a9f84beefdb76ae9424e88.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 4c0675838d72b46062266721e0af921419bb6dc072a9f84beefdb76ae9424e88.exe -
Processes:
resource yara_rule behavioral1/memory/2084-4-0x0000000000EB0000-0x0000000000ECF000-memory.dmp upx behavioral1/files/0x0008000000016d27-2.dat upx behavioral1/memory/2084-0-0x0000000001260000-0x000000000127F000-memory.dmp upx behavioral1/memory/2084-10-0x0000000001260000-0x000000000127F000-memory.dmp upx behavioral1/memory/2084-11-0x0000000000EB0000-0x0000000000ECF000-memory.dmp upx behavioral1/memory/2300-14-0x0000000000EB0000-0x0000000000ECF000-memory.dmp upx behavioral1/memory/2084-20-0x0000000001260000-0x000000000127F000-memory.dmp upx behavioral1/memory/2300-25-0x0000000000EB0000-0x0000000000ECF000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
4c0675838d72b46062266721e0af921419bb6dc072a9f84beefdb76ae9424e88.execmd.exePING.EXEMediaCenter.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4c0675838d72b46062266721e0af921419bb6dc072a9f84beefdb76ae9424e88.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MediaCenter.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
cmd.exePING.EXEpid Process 2220 cmd.exe 2720 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
4c0675838d72b46062266721e0af921419bb6dc072a9f84beefdb76ae9424e88.exedescription pid Process Token: SeIncBasePriorityPrivilege 2084 4c0675838d72b46062266721e0af921419bb6dc072a9f84beefdb76ae9424e88.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
4c0675838d72b46062266721e0af921419bb6dc072a9f84beefdb76ae9424e88.execmd.exedescription pid Process procid_target PID 2084 wrote to memory of 2300 2084 4c0675838d72b46062266721e0af921419bb6dc072a9f84beefdb76ae9424e88.exe 31 PID 2084 wrote to memory of 2300 2084 4c0675838d72b46062266721e0af921419bb6dc072a9f84beefdb76ae9424e88.exe 31 PID 2084 wrote to memory of 2300 2084 4c0675838d72b46062266721e0af921419bb6dc072a9f84beefdb76ae9424e88.exe 31 PID 2084 wrote to memory of 2300 2084 4c0675838d72b46062266721e0af921419bb6dc072a9f84beefdb76ae9424e88.exe 31 PID 2084 wrote to memory of 2220 2084 4c0675838d72b46062266721e0af921419bb6dc072a9f84beefdb76ae9424e88.exe 33 PID 2084 wrote to memory of 2220 2084 4c0675838d72b46062266721e0af921419bb6dc072a9f84beefdb76ae9424e88.exe 33 PID 2084 wrote to memory of 2220 2084 4c0675838d72b46062266721e0af921419bb6dc072a9f84beefdb76ae9424e88.exe 33 PID 2084 wrote to memory of 2220 2084 4c0675838d72b46062266721e0af921419bb6dc072a9f84beefdb76ae9424e88.exe 33 PID 2220 wrote to memory of 2720 2220 cmd.exe 35 PID 2220 wrote to memory of 2720 2220 cmd.exe 35 PID 2220 wrote to memory of 2720 2220 cmd.exe 35 PID 2220 wrote to memory of 2720 2220 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c0675838d72b46062266721e0af921419bb6dc072a9f84beefdb76ae9424e88.exe"C:\Users\Admin\AppData\Local\Temp\4c0675838d72b46062266721e0af921419bb6dc072a9f84beefdb76ae9424e88.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2300
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\4c0675838d72b46062266721e0af921419bb6dc072a9f84beefdb76ae9424e88.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2720
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD5bcf30776c5f0a4eab927b9c2cc519bf3
SHA1901c17acd441936cff67a458e4b963383244a48d
SHA256bc0ed21aaa76d22963c207e4044f38be40fa5ef74479fa133870cc17cfd17dab
SHA5123f7237030edf9e52fbbf89e2fb8b6426b0e7b70f64f9286d465b060b883c9876bb1e2a3d4575f483a41fef667afdbb51c406ea7bcbdd1b84fb273d7fd568ff7f