Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18-12-2024 07:52
Static task
static1
Behavioral task
behavioral1
Sample
e1d17b78363b87c4f704ec862d98db103694de8a130a3cb05bb1bcec86b9cb8a.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
e1d17b78363b87c4f704ec862d98db103694de8a130a3cb05bb1bcec86b9cb8a.exe
Resource
win10v2004-20241007-en
General
-
Target
e1d17b78363b87c4f704ec862d98db103694de8a130a3cb05bb1bcec86b9cb8a.exe
-
Size
36KB
-
MD5
6d499539466acb06679988e9687f781c
-
SHA1
45e746e6ef40b142ab28bcb9b1d917df5295785d
-
SHA256
e1d17b78363b87c4f704ec862d98db103694de8a130a3cb05bb1bcec86b9cb8a
-
SHA512
796af7f5adff5db2ecbc841c2d71ab2ea7eb771dafe164bcfafafcf41d76be49abf923cfc9884b733dcf0562a62994c67fc42a7a3a70929b3a3a740cc163647e
-
SSDEEP
768:lwbYGCv4nuEcJpQK4TQbtKvXwXgA9lJJea+yGCJQqeWnAEv2647D4:lwbYP4nuEApQK4TQbtY2gA9DX+ytBO6
Malware Config
Signatures
-
Sakula family
-
Sakula payload 4 IoCs
resource yara_rule behavioral1/memory/1996-1-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula behavioral1/memory/1072-14-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula behavioral1/memory/1996-20-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula behavioral1/memory/1072-25-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula -
Deletes itself 1 IoCs
pid Process 2256 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1072 MediaCenter.exe -
Loads dropped DLL 2 IoCs
pid Process 1996 e1d17b78363b87c4f704ec862d98db103694de8a130a3cb05bb1bcec86b9cb8a.exe 1996 e1d17b78363b87c4f704ec862d98db103694de8a130a3cb05bb1bcec86b9cb8a.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" e1d17b78363b87c4f704ec862d98db103694de8a130a3cb05bb1bcec86b9cb8a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e1d17b78363b87c4f704ec862d98db103694de8a130a3cb05bb1bcec86b9cb8a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MediaCenter.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2256 cmd.exe 2152 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2152 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1996 e1d17b78363b87c4f704ec862d98db103694de8a130a3cb05bb1bcec86b9cb8a.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1996 wrote to memory of 1072 1996 e1d17b78363b87c4f704ec862d98db103694de8a130a3cb05bb1bcec86b9cb8a.exe 30 PID 1996 wrote to memory of 1072 1996 e1d17b78363b87c4f704ec862d98db103694de8a130a3cb05bb1bcec86b9cb8a.exe 30 PID 1996 wrote to memory of 1072 1996 e1d17b78363b87c4f704ec862d98db103694de8a130a3cb05bb1bcec86b9cb8a.exe 30 PID 1996 wrote to memory of 1072 1996 e1d17b78363b87c4f704ec862d98db103694de8a130a3cb05bb1bcec86b9cb8a.exe 30 PID 1996 wrote to memory of 2256 1996 e1d17b78363b87c4f704ec862d98db103694de8a130a3cb05bb1bcec86b9cb8a.exe 33 PID 1996 wrote to memory of 2256 1996 e1d17b78363b87c4f704ec862d98db103694de8a130a3cb05bb1bcec86b9cb8a.exe 33 PID 1996 wrote to memory of 2256 1996 e1d17b78363b87c4f704ec862d98db103694de8a130a3cb05bb1bcec86b9cb8a.exe 33 PID 1996 wrote to memory of 2256 1996 e1d17b78363b87c4f704ec862d98db103694de8a130a3cb05bb1bcec86b9cb8a.exe 33 PID 2256 wrote to memory of 2152 2256 cmd.exe 35 PID 2256 wrote to memory of 2152 2256 cmd.exe 35 PID 2256 wrote to memory of 2152 2256 cmd.exe 35 PID 2256 wrote to memory of 2152 2256 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1d17b78363b87c4f704ec862d98db103694de8a130a3cb05bb1bcec86b9cb8a.exe"C:\Users\Admin\AppData\Local\Temp\e1d17b78363b87c4f704ec862d98db103694de8a130a3cb05bb1bcec86b9cb8a.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1072
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\e1d17b78363b87c4f704ec862d98db103694de8a130a3cb05bb1bcec86b9cb8a.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2152
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5dd46803a9a5bfa292246ba51fcd2bc33
SHA185e617fc9b28df729aa938b8038f7ef3faaa6b61
SHA256fab5d9dc87de6fd47d040cc2386d4624e7c44bf53d7880c68664fe098ef54e9d
SHA5120db177acf5b810ca718a39208e69737e307932395b2cd57a18840173b625da99febed746ea99aaecd8c633d7e02a7c54fc93b0288ba4ae003aecaffea3eeca34