Analysis
-
max time kernel
114s -
max time network
116s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
11-12-2024 07:38
Static task
static1
Behavioral task
behavioral1
Sample
391df1a54478cf6660133bb89395e990503b10f21f4f14ed41468d46ca06bea4N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
391df1a54478cf6660133bb89395e990503b10f21f4f14ed41468d46ca06bea4N.exe
Resource
win10v2004-20241007-en
General
-
Target
391df1a54478cf6660133bb89395e990503b10f21f4f14ed41468d46ca06bea4N.exe
-
Size
35KB
-
MD5
6437f0cea952a9c24fa47ded7aa8b6c0
-
SHA1
4433d6af44ec84c670667828ee627c3837bfb4da
-
SHA256
391df1a54478cf6660133bb89395e990503b10f21f4f14ed41468d46ca06bea4
-
SHA512
0dcfd2a8ba46d015ab4a84c44799bb26a1c6f3732acd5f9a5bf4bf410faa3785528929c76acafe563db777e4fc7339095cfc6be99ededf38e5a0b7ae5f44301c
-
SSDEEP
768:TwbYGCv4nuEcJpQK4TQbtKvXwXgA9lJJea+yGCJQqeWnAEv2647D2:TwbYP4nuEApQK4TQbtY2gA9DX+ytBOc
Malware Config
Signatures
-
Sakula family
-
Sakula payload 5 IoCs
resource yara_rule behavioral1/memory/1952-10-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula behavioral1/memory/2500-11-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula behavioral1/memory/1952-14-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula behavioral1/memory/2500-20-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula behavioral1/memory/1952-27-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula -
Deletes itself 1 IoCs
pid Process 2396 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1952 MediaCenter.exe -
Loads dropped DLL 2 IoCs
pid Process 2500 391df1a54478cf6660133bb89395e990503b10f21f4f14ed41468d46ca06bea4N.exe 2500 391df1a54478cf6660133bb89395e990503b10f21f4f14ed41468d46ca06bea4N.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 391df1a54478cf6660133bb89395e990503b10f21f4f14ed41468d46ca06bea4N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MediaCenter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 391df1a54478cf6660133bb89395e990503b10f21f4f14ed41468d46ca06bea4N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2396 cmd.exe 1716 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1716 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2500 391df1a54478cf6660133bb89395e990503b10f21f4f14ed41468d46ca06bea4N.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2500 wrote to memory of 1952 2500 391df1a54478cf6660133bb89395e990503b10f21f4f14ed41468d46ca06bea4N.exe 30 PID 2500 wrote to memory of 1952 2500 391df1a54478cf6660133bb89395e990503b10f21f4f14ed41468d46ca06bea4N.exe 30 PID 2500 wrote to memory of 1952 2500 391df1a54478cf6660133bb89395e990503b10f21f4f14ed41468d46ca06bea4N.exe 30 PID 2500 wrote to memory of 1952 2500 391df1a54478cf6660133bb89395e990503b10f21f4f14ed41468d46ca06bea4N.exe 30 PID 2500 wrote to memory of 2396 2500 391df1a54478cf6660133bb89395e990503b10f21f4f14ed41468d46ca06bea4N.exe 33 PID 2500 wrote to memory of 2396 2500 391df1a54478cf6660133bb89395e990503b10f21f4f14ed41468d46ca06bea4N.exe 33 PID 2500 wrote to memory of 2396 2500 391df1a54478cf6660133bb89395e990503b10f21f4f14ed41468d46ca06bea4N.exe 33 PID 2500 wrote to memory of 2396 2500 391df1a54478cf6660133bb89395e990503b10f21f4f14ed41468d46ca06bea4N.exe 33 PID 2396 wrote to memory of 1716 2396 cmd.exe 35 PID 2396 wrote to memory of 1716 2396 cmd.exe 35 PID 2396 wrote to memory of 1716 2396 cmd.exe 35 PID 2396 wrote to memory of 1716 2396 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\391df1a54478cf6660133bb89395e990503b10f21f4f14ed41468d46ca06bea4N.exe"C:\Users\Admin\AppData\Local\Temp\391df1a54478cf6660133bb89395e990503b10f21f4f14ed41468d46ca06bea4N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1952
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\391df1a54478cf6660133bb89395e990503b10f21f4f14ed41468d46ca06bea4N.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1716
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD5db2f4cba095380d670a7ba903f4fa455
SHA17f478ffc317b246669cfbbd8829726bd2b41f322
SHA256810e64e4c07115b0215e0913e26b9a7b7e997d95c84f87b9e42e1ce6d8fc2ce5
SHA512cc04325737c5da4a9e2226b903042c4292cfe38dde9901d961234477053026396d825bbe18029d73c1a0f53e3ecdb5a6f0a241ffceb27b4e2cc449c72e043afd