Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-12-2024 20:02
Behavioral task
behavioral1
Sample
a1609ac64c824718ee1464c8ee66e24d6167a27c94054185b4595350ab5ee86b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a1609ac64c824718ee1464c8ee66e24d6167a27c94054185b4595350ab5ee86b.exe
Resource
win10v2004-20241007-en
General
-
Target
a1609ac64c824718ee1464c8ee66e24d6167a27c94054185b4595350ab5ee86b.exe
-
Size
89KB
-
MD5
a82d0957ae9a8473296d7a75b45f3bff
-
SHA1
edac919768c2bb44efe85e44a784b0e475b777e9
-
SHA256
a1609ac64c824718ee1464c8ee66e24d6167a27c94054185b4595350ab5ee86b
-
SHA512
dc33a277a1c23c4952e366abec3851af9c01a0c912e9d9e03ff901f3d04492612d8568ac9869b0e9417714d505b94fe2f0cbd0280b6af323c4301d514164c454
-
SSDEEP
1536:PQFl29mEkE0L1rDEKrxZKF2zf9g2Pl7W/MwbxMX+ees52z30rtrc:w29DkEGRQixVSjLaes5G30B4
Malware Config
Extracted
sakula
www.polarroute.com
Signatures
-
Sakula family
-
Sakula payload 1 IoCs
Processes:
resource yara_rule behavioral1/files/0x000f00000001866e-4.dat family_sakula -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 2920 cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid Process 2096 MediaCenter.exe -
Loads dropped DLL 1 IoCs
Processes:
a1609ac64c824718ee1464c8ee66e24d6167a27c94054185b4595350ab5ee86b.exepid Process 2364 a1609ac64c824718ee1464c8ee66e24d6167a27c94054185b4595350ab5ee86b.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
a1609ac64c824718ee1464c8ee66e24d6167a27c94054185b4595350ab5ee86b.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" a1609ac64c824718ee1464c8ee66e24d6167a27c94054185b4595350ab5ee86b.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
PING.EXEa1609ac64c824718ee1464c8ee66e24d6167a27c94054185b4595350ab5ee86b.exeMediaCenter.execmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1609ac64c824718ee1464c8ee66e24d6167a27c94054185b4595350ab5ee86b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MediaCenter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
cmd.exePING.EXEpid Process 2920 cmd.exe 2776 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
a1609ac64c824718ee1464c8ee66e24d6167a27c94054185b4595350ab5ee86b.exedescription pid Process Token: SeIncBasePriorityPrivilege 2364 a1609ac64c824718ee1464c8ee66e24d6167a27c94054185b4595350ab5ee86b.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
a1609ac64c824718ee1464c8ee66e24d6167a27c94054185b4595350ab5ee86b.execmd.exedescription pid Process procid_target PID 2364 wrote to memory of 2096 2364 a1609ac64c824718ee1464c8ee66e24d6167a27c94054185b4595350ab5ee86b.exe 31 PID 2364 wrote to memory of 2096 2364 a1609ac64c824718ee1464c8ee66e24d6167a27c94054185b4595350ab5ee86b.exe 31 PID 2364 wrote to memory of 2096 2364 a1609ac64c824718ee1464c8ee66e24d6167a27c94054185b4595350ab5ee86b.exe 31 PID 2364 wrote to memory of 2096 2364 a1609ac64c824718ee1464c8ee66e24d6167a27c94054185b4595350ab5ee86b.exe 31 PID 2364 wrote to memory of 2920 2364 a1609ac64c824718ee1464c8ee66e24d6167a27c94054185b4595350ab5ee86b.exe 33 PID 2364 wrote to memory of 2920 2364 a1609ac64c824718ee1464c8ee66e24d6167a27c94054185b4595350ab5ee86b.exe 33 PID 2364 wrote to memory of 2920 2364 a1609ac64c824718ee1464c8ee66e24d6167a27c94054185b4595350ab5ee86b.exe 33 PID 2364 wrote to memory of 2920 2364 a1609ac64c824718ee1464c8ee66e24d6167a27c94054185b4595350ab5ee86b.exe 33 PID 2920 wrote to memory of 2776 2920 cmd.exe 35 PID 2920 wrote to memory of 2776 2920 cmd.exe 35 PID 2920 wrote to memory of 2776 2920 cmd.exe 35 PID 2920 wrote to memory of 2776 2920 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1609ac64c824718ee1464c8ee66e24d6167a27c94054185b4595350ab5ee86b.exe"C:\Users\Admin\AppData\Local\Temp\a1609ac64c824718ee1464c8ee66e24d6167a27c94054185b4595350ab5ee86b.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2096
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\a1609ac64c824718ee1464c8ee66e24d6167a27c94054185b4595350ab5ee86b.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2776
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD5214f00f19ad7040ace2fed0f83e4390d
SHA1b6e244983624ee36d2f301cf23c417dd5f5b32a3
SHA256ea0d36c85c7b07f3b37940dad5702252cb04bc79740cdc09c98af9cf4826edd0
SHA512462aa6f72754c969119a1ae53108b8c5fff6272a7ad6c1db4563885066799a9e5711eddf817722b30b1a1f63290facccc531d06a50d6fb2336c16f1480950d6e