Analysis
-
max time kernel
118s -
max time network
98s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02-12-2024 10:58
Static task
static1
Behavioral task
behavioral1
Sample
3f1f939543ecb3feefcfb57044ed1cff6131f0f409b0de93720d2721f2903a3e.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3f1f939543ecb3feefcfb57044ed1cff6131f0f409b0de93720d2721f2903a3e.exe
Resource
win10v2004-20241007-en
General
-
Target
3f1f939543ecb3feefcfb57044ed1cff6131f0f409b0de93720d2721f2903a3e.exe
-
Size
105KB
-
MD5
e4613537d468e369e3ba9918e8c85caa
-
SHA1
758576f401b5ef0826aa0112edf6ae25460e98d1
-
SHA256
3f1f939543ecb3feefcfb57044ed1cff6131f0f409b0de93720d2721f2903a3e
-
SHA512
5fbe9fcc20d45af8978cbd891a6d96ff3db547f0446f46e89e626ae6d2f12f2a746638a9e1e1fc46905dba1b7fa2c7b77d1deaec75aa8aabe58f8be4e97f3518
-
SSDEEP
1536:anRw3vN6mG1y8nRB8aX3DVwd4sSH2/fTMLkKFTeUCD+xFOOf4EVRMLfsU9:aCv48aHDCz/LUkwedD+MLfsg
Malware Config
Extracted
sakula
www.polarroute.com
Signatures
-
Sakula family
-
Sakula payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1508-0-0x0000000000400000-0x0000000000438000-memory.dmp family_sakula behavioral1/memory/1508-10-0x0000000000400000-0x0000000000438000-memory.dmp family_sakula behavioral1/memory/2720-12-0x0000000000400000-0x0000000000438000-memory.dmp family_sakula behavioral1/memory/2720-13-0x0000000000400000-0x0000000000438000-memory.dmp family_sakula behavioral1/memory/1508-17-0x0000000000400000-0x0000000000438000-memory.dmp family_sakula behavioral1/memory/2720-23-0x0000000000400000-0x0000000000438000-memory.dmp family_sakula -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 2336 cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid Process 2720 MediaCenter.exe -
Loads dropped DLL 2 IoCs
Processes:
3f1f939543ecb3feefcfb57044ed1cff6131f0f409b0de93720d2721f2903a3e.exepid Process 1508 3f1f939543ecb3feefcfb57044ed1cff6131f0f409b0de93720d2721f2903a3e.exe 1508 3f1f939543ecb3feefcfb57044ed1cff6131f0f409b0de93720d2721f2903a3e.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
3f1f939543ecb3feefcfb57044ed1cff6131f0f409b0de93720d2721f2903a3e.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 3f1f939543ecb3feefcfb57044ed1cff6131f0f409b0de93720d2721f2903a3e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
3f1f939543ecb3feefcfb57044ed1cff6131f0f409b0de93720d2721f2903a3e.exeMediaCenter.execmd.exePING.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3f1f939543ecb3feefcfb57044ed1cff6131f0f409b0de93720d2721f2903a3e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MediaCenter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
cmd.exePING.EXEpid Process 2336 cmd.exe 548 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
3f1f939543ecb3feefcfb57044ed1cff6131f0f409b0de93720d2721f2903a3e.exedescription pid Process Token: SeIncBasePriorityPrivilege 1508 3f1f939543ecb3feefcfb57044ed1cff6131f0f409b0de93720d2721f2903a3e.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
3f1f939543ecb3feefcfb57044ed1cff6131f0f409b0de93720d2721f2903a3e.execmd.exedescription pid Process procid_target PID 1508 wrote to memory of 2720 1508 3f1f939543ecb3feefcfb57044ed1cff6131f0f409b0de93720d2721f2903a3e.exe 30 PID 1508 wrote to memory of 2720 1508 3f1f939543ecb3feefcfb57044ed1cff6131f0f409b0de93720d2721f2903a3e.exe 30 PID 1508 wrote to memory of 2720 1508 3f1f939543ecb3feefcfb57044ed1cff6131f0f409b0de93720d2721f2903a3e.exe 30 PID 1508 wrote to memory of 2720 1508 3f1f939543ecb3feefcfb57044ed1cff6131f0f409b0de93720d2721f2903a3e.exe 30 PID 1508 wrote to memory of 2336 1508 3f1f939543ecb3feefcfb57044ed1cff6131f0f409b0de93720d2721f2903a3e.exe 33 PID 1508 wrote to memory of 2336 1508 3f1f939543ecb3feefcfb57044ed1cff6131f0f409b0de93720d2721f2903a3e.exe 33 PID 1508 wrote to memory of 2336 1508 3f1f939543ecb3feefcfb57044ed1cff6131f0f409b0de93720d2721f2903a3e.exe 33 PID 1508 wrote to memory of 2336 1508 3f1f939543ecb3feefcfb57044ed1cff6131f0f409b0de93720d2721f2903a3e.exe 33 PID 2336 wrote to memory of 548 2336 cmd.exe 35 PID 2336 wrote to memory of 548 2336 cmd.exe 35 PID 2336 wrote to memory of 548 2336 cmd.exe 35 PID 2336 wrote to memory of 548 2336 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f1f939543ecb3feefcfb57044ed1cff6131f0f409b0de93720d2721f2903a3e.exe"C:\Users\Admin\AppData\Local\Temp\3f1f939543ecb3feefcfb57044ed1cff6131f0f409b0de93720d2721f2903a3e.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2720
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\3f1f939543ecb3feefcfb57044ed1cff6131f0f409b0de93720d2721f2903a3e.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:548
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD510ecb2c158db839c18803a4f5b58e535
SHA144c448c118a46a6eb212c8623802acbf58523fcf
SHA256c1bd0041d54fc917d0f4d61b1e1c96d03a415176c97bf01e7e9e297a7d36f4d7
SHA5121bd76bd96176269a5209a77064bbcacad0075b6e73c99af0348d5d0fba5c5379dd5b99c3527d68a28d132ce9442e53474e4b44e6c2fc9768dfda12bdc79e9ac8