Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-01-2025 20:13
Behavioral task
behavioral1
Sample
017a9b7349ab4b4f010e6a697014c75872ebfba4d82f8c1b943cbcd71322da39N.exe
Resource
win7-20240903-en
General
-
Target
017a9b7349ab4b4f010e6a697014c75872ebfba4d82f8c1b943cbcd71322da39N.exe
-
Size
43KB
-
MD5
5000142d57c02901328ff944565227d0
-
SHA1
636ba57de39c6090d328a431b84e008a8ebab551
-
SHA256
017a9b7349ab4b4f010e6a697014c75872ebfba4d82f8c1b943cbcd71322da39
-
SHA512
8f6ed4abbee66442cac52c1864394c933afae558d6e3d41040119d10a6ddf059749e7eda411a5112aea9d13411d6e3bd157e7228e15dff539a8ec0ff8c16f38d
-
SSDEEP
768:+U9XnKJv8KrtPNxT4oreP7cIK3yQpdk6x8pf9m4P/S0hVvIZiGDZ6RO8nHE8taqY:+U9abrtX4oocIK3yQkaY9z/S0hhy6k8S
Malware Config
Signatures
-
Sakula family
-
Sakula payload 5 IoCs
resource yara_rule behavioral1/memory/2776-10-0x0000000000840000-0x000000000085F000-memory.dmp family_sakula behavioral1/memory/2680-11-0x0000000000A50000-0x0000000000A6F000-memory.dmp family_sakula behavioral1/memory/2776-14-0x0000000000840000-0x000000000085F000-memory.dmp family_sakula behavioral1/memory/2680-20-0x0000000000A50000-0x0000000000A6F000-memory.dmp family_sakula behavioral1/memory/2776-25-0x0000000000840000-0x000000000085F000-memory.dmp family_sakula -
Deletes itself 1 IoCs
pid Process 592 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2776 MediaCenter.exe -
Loads dropped DLL 2 IoCs
pid Process 2680 017a9b7349ab4b4f010e6a697014c75872ebfba4d82f8c1b943cbcd71322da39N.exe 2680 017a9b7349ab4b4f010e6a697014c75872ebfba4d82f8c1b943cbcd71322da39N.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 017a9b7349ab4b4f010e6a697014c75872ebfba4d82f8c1b943cbcd71322da39N.exe -
resource yara_rule behavioral1/memory/2680-0-0x0000000000A50000-0x0000000000A6F000-memory.dmp upx behavioral1/files/0x000700000001939f-2.dat upx behavioral1/memory/2680-4-0x0000000000840000-0x000000000085F000-memory.dmp upx behavioral1/memory/2776-10-0x0000000000840000-0x000000000085F000-memory.dmp upx behavioral1/memory/2680-11-0x0000000000A50000-0x0000000000A6F000-memory.dmp upx behavioral1/memory/2776-14-0x0000000000840000-0x000000000085F000-memory.dmp upx behavioral1/memory/2680-20-0x0000000000A50000-0x0000000000A6F000-memory.dmp upx behavioral1/memory/2776-25-0x0000000000840000-0x000000000085F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 017a9b7349ab4b4f010e6a697014c75872ebfba4d82f8c1b943cbcd71322da39N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MediaCenter.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 592 cmd.exe 1220 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1220 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2680 017a9b7349ab4b4f010e6a697014c75872ebfba4d82f8c1b943cbcd71322da39N.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2680 wrote to memory of 2776 2680 017a9b7349ab4b4f010e6a697014c75872ebfba4d82f8c1b943cbcd71322da39N.exe 30 PID 2680 wrote to memory of 2776 2680 017a9b7349ab4b4f010e6a697014c75872ebfba4d82f8c1b943cbcd71322da39N.exe 30 PID 2680 wrote to memory of 2776 2680 017a9b7349ab4b4f010e6a697014c75872ebfba4d82f8c1b943cbcd71322da39N.exe 30 PID 2680 wrote to memory of 2776 2680 017a9b7349ab4b4f010e6a697014c75872ebfba4d82f8c1b943cbcd71322da39N.exe 30 PID 2680 wrote to memory of 592 2680 017a9b7349ab4b4f010e6a697014c75872ebfba4d82f8c1b943cbcd71322da39N.exe 33 PID 2680 wrote to memory of 592 2680 017a9b7349ab4b4f010e6a697014c75872ebfba4d82f8c1b943cbcd71322da39N.exe 33 PID 2680 wrote to memory of 592 2680 017a9b7349ab4b4f010e6a697014c75872ebfba4d82f8c1b943cbcd71322da39N.exe 33 PID 2680 wrote to memory of 592 2680 017a9b7349ab4b4f010e6a697014c75872ebfba4d82f8c1b943cbcd71322da39N.exe 33 PID 592 wrote to memory of 1220 592 cmd.exe 35 PID 592 wrote to memory of 1220 592 cmd.exe 35 PID 592 wrote to memory of 1220 592 cmd.exe 35 PID 592 wrote to memory of 1220 592 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\017a9b7349ab4b4f010e6a697014c75872ebfba4d82f8c1b943cbcd71322da39N.exe"C:\Users\Admin\AppData\Local\Temp\017a9b7349ab4b4f010e6a697014c75872ebfba4d82f8c1b943cbcd71322da39N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2776
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\017a9b7349ab4b4f010e6a697014c75872ebfba4d82f8c1b943cbcd71322da39N.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1220
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD515cce6f006de8b50d31ee75d381793bc
SHA1572175e1d362b7a598140bd53d525e085d29c1f2
SHA256fbf41d1785eef9168d23c8489be3971c1c5fb5a6b258988b152951c8aba918d0
SHA5127b794d0350b511b2962823c391f2411b21f4f7e525e7494b8ce7ae103cfecf587df7ad6cceb7bc11829f76fd9a82eb73e47d7b23da2d4800c98fdb06a960dd8c