Analysis
-
max time kernel
114s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 18:32
Static task
static1
Behavioral task
behavioral1
Sample
9c8e38749ddbc92540c0d7b8c6f6129dc627a1997a4d536f86cbf976a228f1b9N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9c8e38749ddbc92540c0d7b8c6f6129dc627a1997a4d536f86cbf976a228f1b9N.exe
Resource
win10v2004-20241007-en
General
-
Target
9c8e38749ddbc92540c0d7b8c6f6129dc627a1997a4d536f86cbf976a228f1b9N.exe
-
Size
58KB
-
MD5
c2a4b2b77a92345b5731e1fd1df83dc0
-
SHA1
e59dae935d353bd6482386c42b3c797a87c68817
-
SHA256
9c8e38749ddbc92540c0d7b8c6f6129dc627a1997a4d536f86cbf976a228f1b9
-
SHA512
c010a621176f1d73aef675e1b85d8a8a44885e3c8f1646557e2d8dc0cf17f9d9b3d67d77e6263310479ace96eef1d9e76aa7b95e9cad62d965b505e5e6a6deaf
-
SSDEEP
1536:iZioIoCwbYP4nuEApQK4TQbtY2gA9DX+ytBO8c3G3eTJ/6:iEoIlwIguEA4c5DgA9DOyq0eFi
Malware Config
Signatures
-
Sakula family
-
Sakula payload 4 IoCs
resource yara_rule behavioral2/memory/4588-5-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula behavioral2/memory/2100-7-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula behavioral2/memory/4588-13-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula behavioral2/memory/2100-18-0x0000000000400000-0x000000000041A000-memory.dmp family_sakula -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 9c8e38749ddbc92540c0d7b8c6f6129dc627a1997a4d536f86cbf976a228f1b9N.exe -
Executes dropped EXE 1 IoCs
pid Process 2100 MediaCenter.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 9c8e38749ddbc92540c0d7b8c6f6129dc627a1997a4d536f86cbf976a228f1b9N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MediaCenter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9c8e38749ddbc92540c0d7b8c6f6129dc627a1997a4d536f86cbf976a228f1b9N.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4936 cmd.exe 3604 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3604 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4588 9c8e38749ddbc92540c0d7b8c6f6129dc627a1997a4d536f86cbf976a228f1b9N.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4588 wrote to memory of 2100 4588 9c8e38749ddbc92540c0d7b8c6f6129dc627a1997a4d536f86cbf976a228f1b9N.exe 84 PID 4588 wrote to memory of 2100 4588 9c8e38749ddbc92540c0d7b8c6f6129dc627a1997a4d536f86cbf976a228f1b9N.exe 84 PID 4588 wrote to memory of 2100 4588 9c8e38749ddbc92540c0d7b8c6f6129dc627a1997a4d536f86cbf976a228f1b9N.exe 84 PID 4588 wrote to memory of 4936 4588 9c8e38749ddbc92540c0d7b8c6f6129dc627a1997a4d536f86cbf976a228f1b9N.exe 100 PID 4588 wrote to memory of 4936 4588 9c8e38749ddbc92540c0d7b8c6f6129dc627a1997a4d536f86cbf976a228f1b9N.exe 100 PID 4588 wrote to memory of 4936 4588 9c8e38749ddbc92540c0d7b8c6f6129dc627a1997a4d536f86cbf976a228f1b9N.exe 100 PID 4936 wrote to memory of 3604 4936 cmd.exe 102 PID 4936 wrote to memory of 3604 4936 cmd.exe 102 PID 4936 wrote to memory of 3604 4936 cmd.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c8e38749ddbc92540c0d7b8c6f6129dc627a1997a4d536f86cbf976a228f1b9N.exe"C:\Users\Admin\AppData\Local\Temp\9c8e38749ddbc92540c0d7b8c6f6129dc627a1997a4d536f86cbf976a228f1b9N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2100
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\9c8e38749ddbc92540c0d7b8c6f6129dc627a1997a4d536f86cbf976a228f1b9N.exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3604
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58KB
MD5af8e30113429525e58c87375d57515c4
SHA19fec89a1e9cc9d9487849c179233b11697930f10
SHA25668f09ac7f3759de005ab6cb8c92e5ea7fa3a8c23a6e7787511426ef304dc37db
SHA5126bd8040e392fe877a0155f3a29f2b8647b9f99abe3784710e28918d8b998c25b6b04ebf999fd24a6d017602866e59a029e1c42c6c29bbd1b3fdf5e21e0c11b55