Analysis
-
max time kernel
98s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2024 20:02
Behavioral task
behavioral1
Sample
a1609ac64c824718ee1464c8ee66e24d6167a27c94054185b4595350ab5ee86b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a1609ac64c824718ee1464c8ee66e24d6167a27c94054185b4595350ab5ee86b.exe
Resource
win10v2004-20241007-en
General
-
Target
a1609ac64c824718ee1464c8ee66e24d6167a27c94054185b4595350ab5ee86b.exe
-
Size
89KB
-
MD5
a82d0957ae9a8473296d7a75b45f3bff
-
SHA1
edac919768c2bb44efe85e44a784b0e475b777e9
-
SHA256
a1609ac64c824718ee1464c8ee66e24d6167a27c94054185b4595350ab5ee86b
-
SHA512
dc33a277a1c23c4952e366abec3851af9c01a0c912e9d9e03ff901f3d04492612d8568ac9869b0e9417714d505b94fe2f0cbd0280b6af323c4301d514164c454
-
SSDEEP
1536:PQFl29mEkE0L1rDEKrxZKF2zf9g2Pl7W/MwbxMX+ees52z30rtrc:w29DkEGRQixVSjLaes5G30B4
Malware Config
Extracted
sakula
www.polarroute.com
Signatures
-
Sakula family
-
Sakula payload 1 IoCs
Processes:
resource yara_rule behavioral2/files/0x000e000000023bb7-3.dat family_sakula -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
a1609ac64c824718ee1464c8ee66e24d6167a27c94054185b4595350ab5ee86b.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation a1609ac64c824718ee1464c8ee66e24d6167a27c94054185b4595350ab5ee86b.exe -
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid Process 748 MediaCenter.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
a1609ac64c824718ee1464c8ee66e24d6167a27c94054185b4595350ab5ee86b.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" a1609ac64c824718ee1464c8ee66e24d6167a27c94054185b4595350ab5ee86b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
a1609ac64c824718ee1464c8ee66e24d6167a27c94054185b4595350ab5ee86b.exeMediaCenter.execmd.exePING.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1609ac64c824718ee1464c8ee66e24d6167a27c94054185b4595350ab5ee86b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MediaCenter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
cmd.exePING.EXEpid Process 1384 cmd.exe 2420 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
a1609ac64c824718ee1464c8ee66e24d6167a27c94054185b4595350ab5ee86b.exedescription pid Process Token: SeIncBasePriorityPrivilege 5080 a1609ac64c824718ee1464c8ee66e24d6167a27c94054185b4595350ab5ee86b.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
a1609ac64c824718ee1464c8ee66e24d6167a27c94054185b4595350ab5ee86b.execmd.exedescription pid Process procid_target PID 5080 wrote to memory of 748 5080 a1609ac64c824718ee1464c8ee66e24d6167a27c94054185b4595350ab5ee86b.exe 83 PID 5080 wrote to memory of 748 5080 a1609ac64c824718ee1464c8ee66e24d6167a27c94054185b4595350ab5ee86b.exe 83 PID 5080 wrote to memory of 748 5080 a1609ac64c824718ee1464c8ee66e24d6167a27c94054185b4595350ab5ee86b.exe 83 PID 5080 wrote to memory of 1384 5080 a1609ac64c824718ee1464c8ee66e24d6167a27c94054185b4595350ab5ee86b.exe 99 PID 5080 wrote to memory of 1384 5080 a1609ac64c824718ee1464c8ee66e24d6167a27c94054185b4595350ab5ee86b.exe 99 PID 5080 wrote to memory of 1384 5080 a1609ac64c824718ee1464c8ee66e24d6167a27c94054185b4595350ab5ee86b.exe 99 PID 1384 wrote to memory of 2420 1384 cmd.exe 101 PID 1384 wrote to memory of 2420 1384 cmd.exe 101 PID 1384 wrote to memory of 2420 1384 cmd.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1609ac64c824718ee1464c8ee66e24d6167a27c94054185b4595350ab5ee86b.exe"C:\Users\Admin\AppData\Local\Temp\a1609ac64c824718ee1464c8ee66e24d6167a27c94054185b4595350ab5ee86b.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:748
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\a1609ac64c824718ee1464c8ee66e24d6167a27c94054185b4595350ab5ee86b.exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2420
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD511a186041007342d7138a236a414a9c6
SHA1e660489247211beee2f048b0eeabf6383a1271dc
SHA2561ba67f749dfe2008e6495a26231250265ea904c1626dc7cfbe2283aa3d2d7941
SHA5125710a304818b1edf69a388786e5962ed6528e5c665622035a1a6f9f7af7161d0921ad935f291a7dbe12516945626ffff24ad96fec0a9d7373171c8a42862e446