Analysis
-
max time kernel
140s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2025 06:40
Behavioral task
behavioral1
Sample
e0119b9b7b812edbf103f8ddd8344213daaebd534bb71c2a7e7879ec8ee06fdd.exe
Resource
win7-20241010-en
General
-
Target
e0119b9b7b812edbf103f8ddd8344213daaebd534bb71c2a7e7879ec8ee06fdd.exe
-
Size
43KB
-
MD5
d44ae63be1a185d27410e6f2a202d21b
-
SHA1
84679270ebee0dc3b20293a1a0ba5a46d8bd3047
-
SHA256
e0119b9b7b812edbf103f8ddd8344213daaebd534bb71c2a7e7879ec8ee06fdd
-
SHA512
60b3ab217b32da4e0d7f9887e88dc753c103a1dbf1971f800f9f882f0200bff1aa3ddcec0a3442d43e0d83e2e744c023dfb07e70164a9342e02b4401c2092d6b
-
SSDEEP
768:+U9XnKJv8KrtPNxT4oreP7cIK3yQpdk6x8pf9m4P/S0hVvIZiGDZ6RO8nHE8taqE:+U9abrtX4oocIK3yQkaY9z/S0hhy6k8O
Malware Config
Signatures
-
Sakula family
-
Sakula payload 4 IoCs
resource yara_rule behavioral2/memory/1800-6-0x0000000000510000-0x000000000052F000-memory.dmp family_sakula behavioral2/memory/3456-8-0x0000000000780000-0x000000000079F000-memory.dmp family_sakula behavioral2/memory/1800-13-0x0000000000510000-0x000000000052F000-memory.dmp family_sakula behavioral2/memory/3456-16-0x0000000000780000-0x000000000079F000-memory.dmp family_sakula -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation e0119b9b7b812edbf103f8ddd8344213daaebd534bb71c2a7e7879ec8ee06fdd.exe -
Executes dropped EXE 1 IoCs
pid Process 3456 MediaCenter.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" e0119b9b7b812edbf103f8ddd8344213daaebd534bb71c2a7e7879ec8ee06fdd.exe -
resource yara_rule behavioral2/memory/1800-0-0x0000000000510000-0x000000000052F000-memory.dmp upx behavioral2/files/0x0008000000023c55-3.dat upx behavioral2/memory/3456-4-0x0000000000780000-0x000000000079F000-memory.dmp upx behavioral2/memory/1800-6-0x0000000000510000-0x000000000052F000-memory.dmp upx behavioral2/memory/3456-8-0x0000000000780000-0x000000000079F000-memory.dmp upx behavioral2/memory/1800-13-0x0000000000510000-0x000000000052F000-memory.dmp upx behavioral2/memory/3456-16-0x0000000000780000-0x000000000079F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MediaCenter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e0119b9b7b812edbf103f8ddd8344213daaebd534bb71c2a7e7879ec8ee06fdd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 5016 cmd.exe 3208 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3208 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1800 e0119b9b7b812edbf103f8ddd8344213daaebd534bb71c2a7e7879ec8ee06fdd.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1800 wrote to memory of 3456 1800 e0119b9b7b812edbf103f8ddd8344213daaebd534bb71c2a7e7879ec8ee06fdd.exe 83 PID 1800 wrote to memory of 3456 1800 e0119b9b7b812edbf103f8ddd8344213daaebd534bb71c2a7e7879ec8ee06fdd.exe 83 PID 1800 wrote to memory of 3456 1800 e0119b9b7b812edbf103f8ddd8344213daaebd534bb71c2a7e7879ec8ee06fdd.exe 83 PID 1800 wrote to memory of 5016 1800 e0119b9b7b812edbf103f8ddd8344213daaebd534bb71c2a7e7879ec8ee06fdd.exe 100 PID 1800 wrote to memory of 5016 1800 e0119b9b7b812edbf103f8ddd8344213daaebd534bb71c2a7e7879ec8ee06fdd.exe 100 PID 1800 wrote to memory of 5016 1800 e0119b9b7b812edbf103f8ddd8344213daaebd534bb71c2a7e7879ec8ee06fdd.exe 100 PID 5016 wrote to memory of 3208 5016 cmd.exe 102 PID 5016 wrote to memory of 3208 5016 cmd.exe 102 PID 5016 wrote to memory of 3208 5016 cmd.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0119b9b7b812edbf103f8ddd8344213daaebd534bb71c2a7e7879ec8ee06fdd.exe"C:\Users\Admin\AppData\Local\Temp\e0119b9b7b812edbf103f8ddd8344213daaebd534bb71c2a7e7879ec8ee06fdd.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3456
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\e0119b9b7b812edbf103f8ddd8344213daaebd534bb71c2a7e7879ec8ee06fdd.exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3208
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD573a7d80d24602ae08c1a442cfb07cd56
SHA19b2d32c97fa2c12b2539545f5e1573f782ed6c93
SHA25689e78673189971f96a6a98c72c6a8ba63960c83331496af2f366ab61a75a45e5
SHA5129a29c529b9ef815f4d399453faac7c7d34b8e4ab5a4a76ccf1fa8daf1985f402a570404b2cf8dfb0593bf9c0017a8e5e896e09c5b696019cfd0386e68ddc6812