Analysis
-
max time kernel
110s -
max time network
106s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-01-2025 23:33
Behavioral task
behavioral1
Sample
568c6f6d618888fc5e45fdf92efc1f1b305ea0fe44a381e658c742606a49642bN.exe
Resource
win7-20240903-en
General
-
Target
568c6f6d618888fc5e45fdf92efc1f1b305ea0fe44a381e658c742606a49642bN.exe
-
Size
41KB
-
MD5
90e2860356fe3144cd81609f566a5d50
-
SHA1
a101eecbcdcac2439bcc1ff8dfe8ace7aac734e6
-
SHA256
568c6f6d618888fc5e45fdf92efc1f1b305ea0fe44a381e658c742606a49642b
-
SHA512
09ad6fd2846d67e2519d292a39b4e39320d8ca6b0a80a6000c89ebef4f034d5cdd5a9acc753cf43eba73d6745fc57d46bed69975cdb79d0d7d15b75fb6f8d833
-
SSDEEP
768:9zpVJi5kPTIukEYpcHOZ6rFSBZxkXNVkSXtfgn3JkcBwQoabJF7nbcuyD7UT:N/JKiMLE9bOq5fgn6Ozoaz7nouy8T
Malware Config
Extracted
sakula
www.polarroute.com
Signatures
-
Sakula family
-
Sakula payload 3 IoCs
resource yara_rule behavioral1/memory/2528-12-0x0000000000400000-0x000000000041E000-memory.dmp family_sakula behavioral1/memory/2668-14-0x0000000000400000-0x000000000041E000-memory.dmp family_sakula behavioral1/memory/2528-22-0x0000000000400000-0x000000000041E000-memory.dmp family_sakula -
Deletes itself 1 IoCs
pid Process 2928 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2668 MediaCenter.exe -
Loads dropped DLL 1 IoCs
pid Process 2528 568c6f6d618888fc5e45fdf92efc1f1b305ea0fe44a381e658c742606a49642bN.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 568c6f6d618888fc5e45fdf92efc1f1b305ea0fe44a381e658c742606a49642bN.exe -
resource yara_rule behavioral1/memory/2528-0-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/files/0x0008000000017481-2.dat upx behavioral1/memory/2668-7-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2528-12-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2668-14-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2528-22-0x0000000000400000-0x000000000041E000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 568c6f6d618888fc5e45fdf92efc1f1b305ea0fe44a381e658c742606a49642bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MediaCenter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2928 cmd.exe 2632 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2632 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2528 568c6f6d618888fc5e45fdf92efc1f1b305ea0fe44a381e658c742606a49642bN.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2528 wrote to memory of 2668 2528 568c6f6d618888fc5e45fdf92efc1f1b305ea0fe44a381e658c742606a49642bN.exe 30 PID 2528 wrote to memory of 2668 2528 568c6f6d618888fc5e45fdf92efc1f1b305ea0fe44a381e658c742606a49642bN.exe 30 PID 2528 wrote to memory of 2668 2528 568c6f6d618888fc5e45fdf92efc1f1b305ea0fe44a381e658c742606a49642bN.exe 30 PID 2528 wrote to memory of 2668 2528 568c6f6d618888fc5e45fdf92efc1f1b305ea0fe44a381e658c742606a49642bN.exe 30 PID 2528 wrote to memory of 2928 2528 568c6f6d618888fc5e45fdf92efc1f1b305ea0fe44a381e658c742606a49642bN.exe 33 PID 2528 wrote to memory of 2928 2528 568c6f6d618888fc5e45fdf92efc1f1b305ea0fe44a381e658c742606a49642bN.exe 33 PID 2528 wrote to memory of 2928 2528 568c6f6d618888fc5e45fdf92efc1f1b305ea0fe44a381e658c742606a49642bN.exe 33 PID 2528 wrote to memory of 2928 2528 568c6f6d618888fc5e45fdf92efc1f1b305ea0fe44a381e658c742606a49642bN.exe 33 PID 2928 wrote to memory of 2632 2928 cmd.exe 35 PID 2928 wrote to memory of 2632 2928 cmd.exe 35 PID 2928 wrote to memory of 2632 2928 cmd.exe 35 PID 2928 wrote to memory of 2632 2928 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\568c6f6d618888fc5e45fdf92efc1f1b305ea0fe44a381e658c742606a49642bN.exe"C:\Users\Admin\AppData\Local\Temp\568c6f6d618888fc5e45fdf92efc1f1b305ea0fe44a381e658c742606a49642bN.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2668
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\568c6f6d618888fc5e45fdf92efc1f1b305ea0fe44a381e658c742606a49642bN.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2632
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD5ce20f0d762ea64f3f3c2698255532720
SHA1299970f363ffb95a99c64bec010c544052ea00ee
SHA25651e9db393a60e415b53b351fb7d7ce0a3f30bbe7c6c9c13199537ed693e994dc
SHA512401e5987ff47e8012144fb227c694c48701f867f488fc35894f3dbda6a88b37d3a0633ad849a014730e6b49435a17904587bc86737584937e4fd9a9e01f987dd