Overview
overview
10Static
static
101bd433962f...3c.exe
windows7-x64
101bd433962f...3c.exe
windows10-2004-x64
101bd433962f...3c.exe
android-9-x86
1bd433962f...3c.exe
android-10-x64
1bd433962f...3c.exe
android-11-x64
1bd433962f...3c.exe
macos-10.15-amd64
1bd433962f...3c.exe
ubuntu-18.04-amd64
1bd433962f...3c.exe
debian-9-armhf
1bd433962f...3c.exe
debian-9-mips
1bd433962f...3c.exe
debian-9-mipsel
out.exe
windows7-x64
out.exe
windows10-2004-x64
out.exe
android-9-x86
out.exe
android-10-x64
out.exe
android-11-x64
out.exe
macos-10.15-amd64
out.exe
ubuntu-18.04-amd64
out.exe
debian-9-armhf
out.exe
debian-9-mips
out.exe
debian-9-mipsel
Analysis
-
max time kernel
890s -
max time network
888s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-01-2025 03:28
Behavioral task
behavioral1
Sample
1bd433962f23ac292f0e28f5c97cee817a4ad0d7462e50f4b7dde0974a587a3c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1bd433962f23ac292f0e28f5c97cee817a4ad0d7462e50f4b7dde0974a587a3c.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
1bd433962f23ac292f0e28f5c97cee817a4ad0d7462e50f4b7dde0974a587a3c.exe
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral4
Sample
1bd433962f23ac292f0e28f5c97cee817a4ad0d7462e50f4b7dde0974a587a3c.exe
Resource
android-x64-20240624-en
Behavioral task
behavioral5
Sample
1bd433962f23ac292f0e28f5c97cee817a4ad0d7462e50f4b7dde0974a587a3c.exe
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral6
Sample
1bd433962f23ac292f0e28f5c97cee817a4ad0d7462e50f4b7dde0974a587a3c.exe
Resource
macos-20241106-en
Behavioral task
behavioral7
Sample
1bd433962f23ac292f0e28f5c97cee817a4ad0d7462e50f4b7dde0974a587a3c.exe
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral8
Sample
1bd433962f23ac292f0e28f5c97cee817a4ad0d7462e50f4b7dde0974a587a3c.exe
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral9
Sample
1bd433962f23ac292f0e28f5c97cee817a4ad0d7462e50f4b7dde0974a587a3c.exe
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral10
Sample
1bd433962f23ac292f0e28f5c97cee817a4ad0d7462e50f4b7dde0974a587a3c.exe
Resource
debian9-mipsel-20240729-en
Behavioral task
behavioral11
Sample
out.exe
Resource
win7-20241023-en
Behavioral task
behavioral12
Sample
out.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
out.exe
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral14
Sample
out.exe
Resource
android-x64-20240624-en
Behavioral task
behavioral15
Sample
out.exe
Resource
android-x64-arm64-20240910-en
Behavioral task
behavioral16
Sample
out.exe
Resource
macos-20241101-en
Behavioral task
behavioral17
Sample
out.exe
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral18
Sample
out.exe
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral19
Sample
out.exe
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral20
Sample
out.exe
Resource
debian9-mipsel-20240611-en
General
-
Target
1bd433962f23ac292f0e28f5c97cee817a4ad0d7462e50f4b7dde0974a587a3c.exe
-
Size
63KB
-
MD5
c798e56eadccbe80c166b9b7bfceaf05
-
SHA1
60a9a6db2cabaec6476544dd1e9ddf2256c3497d
-
SHA256
1bd433962f23ac292f0e28f5c97cee817a4ad0d7462e50f4b7dde0974a587a3c
-
SHA512
f3269d5a59f6f6d7817be2ee9a7c8954642c90df2fea3ffe9ac221d33925595ed48c22f4c2c69ecbd1a6691d7c45e8f417a874a6c3b2cca96f5fe0e41f7c97b8
-
SSDEEP
1536:zoxBP0D61Oj3+5FdOa52C8pdo95j6hZ2MzNDCkrs:0PPUj3+5FMIn8To94wa7s
Malware Config
Extracted
sakula
www.polarroute.com
Signatures
-
Sakula family
-
Sakula payload 3 IoCs
resource yara_rule behavioral1/memory/2908-1-0x0000000000400000-0x0000000000424000-memory.dmp family_sakula behavioral1/memory/3024-13-0x0000000000400000-0x0000000000424000-memory.dmp family_sakula behavioral1/memory/2908-21-0x0000000000400000-0x0000000000424000-memory.dmp family_sakula -
Deletes itself 1 IoCs
pid Process 2676 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 3024 MediaCenter.exe -
Loads dropped DLL 1 IoCs
pid Process 2908 1bd433962f23ac292f0e28f5c97cee817a4ad0d7462e50f4b7dde0974a587a3c.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 1bd433962f23ac292f0e28f5c97cee817a4ad0d7462e50f4b7dde0974a587a3c.exe -
resource yara_rule behavioral1/memory/2908-1-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/files/0x0009000000015d6e-5.dat upx behavioral1/memory/3024-7-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/3024-13-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/2908-21-0x0000000000400000-0x0000000000424000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1bd433962f23ac292f0e28f5c97cee817a4ad0d7462e50f4b7dde0974a587a3c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MediaCenter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2676 cmd.exe 2632 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2632 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2908 1bd433962f23ac292f0e28f5c97cee817a4ad0d7462e50f4b7dde0974a587a3c.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2908 wrote to memory of 3024 2908 1bd433962f23ac292f0e28f5c97cee817a4ad0d7462e50f4b7dde0974a587a3c.exe 28 PID 2908 wrote to memory of 3024 2908 1bd433962f23ac292f0e28f5c97cee817a4ad0d7462e50f4b7dde0974a587a3c.exe 28 PID 2908 wrote to memory of 3024 2908 1bd433962f23ac292f0e28f5c97cee817a4ad0d7462e50f4b7dde0974a587a3c.exe 28 PID 2908 wrote to memory of 3024 2908 1bd433962f23ac292f0e28f5c97cee817a4ad0d7462e50f4b7dde0974a587a3c.exe 28 PID 2908 wrote to memory of 2676 2908 1bd433962f23ac292f0e28f5c97cee817a4ad0d7462e50f4b7dde0974a587a3c.exe 32 PID 2908 wrote to memory of 2676 2908 1bd433962f23ac292f0e28f5c97cee817a4ad0d7462e50f4b7dde0974a587a3c.exe 32 PID 2908 wrote to memory of 2676 2908 1bd433962f23ac292f0e28f5c97cee817a4ad0d7462e50f4b7dde0974a587a3c.exe 32 PID 2908 wrote to memory of 2676 2908 1bd433962f23ac292f0e28f5c97cee817a4ad0d7462e50f4b7dde0974a587a3c.exe 32 PID 2676 wrote to memory of 2632 2676 cmd.exe 34 PID 2676 wrote to memory of 2632 2676 cmd.exe 34 PID 2676 wrote to memory of 2632 2676 cmd.exe 34 PID 2676 wrote to memory of 2632 2676 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\1bd433962f23ac292f0e28f5c97cee817a4ad0d7462e50f4b7dde0974a587a3c.exeC:\Users\Admin\AppData\Local\Temp\1bd433962f23ac292f0e28f5c97cee817a4ad0d7462e50f4b7dde0974a587a3c.exe cmd /c %SIGILL% "SIGTERM|DELETE|SIGKILL"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3024
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\1bd433962f23ac292f0e28f5c97cee817a4ad0d7462e50f4b7dde0974a587a3c.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2632
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD53b4a0ece8a304dc22daddd870badbdd8
SHA1c92e66960e198decee58b4d2e64ec494a6cb0897
SHA2568d5219ce8694fab28d3d1911e3aae6f41dbfe3b47aa21ef12ee2625ef37233c0
SHA512b8ecb7dce3c7bc6304a9d868b951700395a2a60dc6a6e0aea65c0269426b8981b7bb530a7fae5620f5c406e9849226eea8cbbf4d0c19fb3d1113158398a03268