Overview
overview
10Static
static
101bd433962f...3c.exe
windows7-x64
101bd433962f...3c.exe
windows10-2004-x64
101bd433962f...3c.exe
android-9-x86
1bd433962f...3c.exe
android-10-x64
1bd433962f...3c.exe
android-11-x64
1bd433962f...3c.exe
macos-10.15-amd64
1bd433962f...3c.exe
ubuntu-18.04-amd64
1bd433962f...3c.exe
debian-9-armhf
1bd433962f...3c.exe
debian-9-mips
1bd433962f...3c.exe
debian-9-mipsel
out.exe
windows7-x64
out.exe
windows10-2004-x64
out.exe
android-9-x86
out.exe
android-10-x64
out.exe
android-11-x64
out.exe
macos-10.15-amd64
out.exe
ubuntu-18.04-amd64
out.exe
debian-9-armhf
out.exe
debian-9-mips
out.exe
debian-9-mipsel
Analysis
-
max time kernel
891s -
max time network
898s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-01-2025 03:28
Behavioral task
behavioral1
Sample
1bd433962f23ac292f0e28f5c97cee817a4ad0d7462e50f4b7dde0974a587a3c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1bd433962f23ac292f0e28f5c97cee817a4ad0d7462e50f4b7dde0974a587a3c.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
1bd433962f23ac292f0e28f5c97cee817a4ad0d7462e50f4b7dde0974a587a3c.exe
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral4
Sample
1bd433962f23ac292f0e28f5c97cee817a4ad0d7462e50f4b7dde0974a587a3c.exe
Resource
android-x64-20240624-en
Behavioral task
behavioral5
Sample
1bd433962f23ac292f0e28f5c97cee817a4ad0d7462e50f4b7dde0974a587a3c.exe
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral6
Sample
1bd433962f23ac292f0e28f5c97cee817a4ad0d7462e50f4b7dde0974a587a3c.exe
Resource
macos-20241106-en
Behavioral task
behavioral7
Sample
1bd433962f23ac292f0e28f5c97cee817a4ad0d7462e50f4b7dde0974a587a3c.exe
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral8
Sample
1bd433962f23ac292f0e28f5c97cee817a4ad0d7462e50f4b7dde0974a587a3c.exe
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral9
Sample
1bd433962f23ac292f0e28f5c97cee817a4ad0d7462e50f4b7dde0974a587a3c.exe
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral10
Sample
1bd433962f23ac292f0e28f5c97cee817a4ad0d7462e50f4b7dde0974a587a3c.exe
Resource
debian9-mipsel-20240729-en
Behavioral task
behavioral11
Sample
out.exe
Resource
win7-20241023-en
Behavioral task
behavioral12
Sample
out.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
out.exe
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral14
Sample
out.exe
Resource
android-x64-20240624-en
Behavioral task
behavioral15
Sample
out.exe
Resource
android-x64-arm64-20240910-en
Behavioral task
behavioral16
Sample
out.exe
Resource
macos-20241101-en
Behavioral task
behavioral17
Sample
out.exe
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral18
Sample
out.exe
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral19
Sample
out.exe
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral20
Sample
out.exe
Resource
debian9-mipsel-20240611-en
General
-
Target
1bd433962f23ac292f0e28f5c97cee817a4ad0d7462e50f4b7dde0974a587a3c.exe
-
Size
63KB
-
MD5
c798e56eadccbe80c166b9b7bfceaf05
-
SHA1
60a9a6db2cabaec6476544dd1e9ddf2256c3497d
-
SHA256
1bd433962f23ac292f0e28f5c97cee817a4ad0d7462e50f4b7dde0974a587a3c
-
SHA512
f3269d5a59f6f6d7817be2ee9a7c8954642c90df2fea3ffe9ac221d33925595ed48c22f4c2c69ecbd1a6691d7c45e8f417a874a6c3b2cca96f5fe0e41f7c97b8
-
SSDEEP
1536:zoxBP0D61Oj3+5FdOa52C8pdo95j6hZ2MzNDCkrs:0PPUj3+5FMIn8To94wa7s
Malware Config
Extracted
sakula
www.polarroute.com
Signatures
-
Sakula family
-
Sakula payload 3 IoCs
resource yara_rule behavioral2/memory/3992-9-0x0000000000400000-0x0000000000424000-memory.dmp family_sakula behavioral2/memory/4336-11-0x0000000000400000-0x0000000000424000-memory.dmp family_sakula behavioral2/memory/3992-17-0x0000000000400000-0x0000000000424000-memory.dmp family_sakula -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 1bd433962f23ac292f0e28f5c97cee817a4ad0d7462e50f4b7dde0974a587a3c.exe -
Executes dropped EXE 1 IoCs
pid Process 4336 MediaCenter.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 1bd433962f23ac292f0e28f5c97cee817a4ad0d7462e50f4b7dde0974a587a3c.exe -
resource yara_rule behavioral2/memory/3992-0-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/files/0x000d000000023b6d-3.dat upx behavioral2/memory/3992-9-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/4336-11-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/3992-17-0x0000000000400000-0x0000000000424000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1bd433962f23ac292f0e28f5c97cee817a4ad0d7462e50f4b7dde0974a587a3c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MediaCenter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3892 cmd.exe 2184 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2184 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3992 1bd433962f23ac292f0e28f5c97cee817a4ad0d7462e50f4b7dde0974a587a3c.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3992 wrote to memory of 4336 3992 1bd433962f23ac292f0e28f5c97cee817a4ad0d7462e50f4b7dde0974a587a3c.exe 82 PID 3992 wrote to memory of 4336 3992 1bd433962f23ac292f0e28f5c97cee817a4ad0d7462e50f4b7dde0974a587a3c.exe 82 PID 3992 wrote to memory of 4336 3992 1bd433962f23ac292f0e28f5c97cee817a4ad0d7462e50f4b7dde0974a587a3c.exe 82 PID 3992 wrote to memory of 3892 3992 1bd433962f23ac292f0e28f5c97cee817a4ad0d7462e50f4b7dde0974a587a3c.exe 91 PID 3992 wrote to memory of 3892 3992 1bd433962f23ac292f0e28f5c97cee817a4ad0d7462e50f4b7dde0974a587a3c.exe 91 PID 3992 wrote to memory of 3892 3992 1bd433962f23ac292f0e28f5c97cee817a4ad0d7462e50f4b7dde0974a587a3c.exe 91 PID 3892 wrote to memory of 2184 3892 cmd.exe 93 PID 3892 wrote to memory of 2184 3892 cmd.exe 93 PID 3892 wrote to memory of 2184 3892 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\1bd433962f23ac292f0e28f5c97cee817a4ad0d7462e50f4b7dde0974a587a3c.exeC:\Users\Admin\AppData\Local\Temp\1bd433962f23ac292f0e28f5c97cee817a4ad0d7462e50f4b7dde0974a587a3c.exe cmd /c %SIGILL% "SIGTERM|DELETE|SIGKILL"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4336
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\1bd433962f23ac292f0e28f5c97cee817a4ad0d7462e50f4b7dde0974a587a3c.exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2184
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD5ae44df9b02b11103f10cd56f3f7d4eba
SHA1dccfdb753115945fbcb506ae7f424c63cbca5a2b
SHA256607ace57b4a9a89bac2cbecd465a74792f50a4a1cfacdf0871ee3fd82394dc49
SHA512976681e04d222296a929bb6f771b55a71b63b039b63c4dbc76e5b1912d00cb867506ffdd97126ca57b30485c1cc0eda651e10f0c0ef091cc5294bdab7cc0e5e2