Analysis
-
max time kernel
97s -
max time network
108s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
17-01-2025 07:53
Behavioral task
behavioral1
Sample
bb3ce31f9d2c3f499b91359bb5efc8ccfff814eab8fb65ab5c0ae6b161e908a4N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
bb3ce31f9d2c3f499b91359bb5efc8ccfff814eab8fb65ab5c0ae6b161e908a4N.exe
Resource
win10v2004-20241007-en
General
-
Target
bb3ce31f9d2c3f499b91359bb5efc8ccfff814eab8fb65ab5c0ae6b161e908a4N.exe
-
Size
912KB
-
MD5
af5fc906cb4eb002b1a4b14a8bc45020
-
SHA1
aee9ca177b7d8b33fd4462518b1fdde8ec475946
-
SHA256
bb3ce31f9d2c3f499b91359bb5efc8ccfff814eab8fb65ab5c0ae6b161e908a4
-
SHA512
ac3b2b5c4449c9bc3a3c344e3d72adeb82c71a0defa83f51e385e68551319791aebaef484177b8a688389adc72e4b99712339cd33029d220439e8b6e0af053ee
-
SSDEEP
12288:0RfQn+w8EYiBlMkn5f9J105ko8T6csV5f1bYQog9hVn454E4Ciy:g4+wlYBsb3zNs5f1bYInVn454Egy
Malware Config
Extracted
sakula
www.polarroute.com
Signatures
-
Sakula family
-
Sakula payload 5 IoCs
resource yara_rule behavioral1/memory/2396-1-0x0000000000400000-0x0000000000420000-memory.dmp family_sakula behavioral1/files/0x0009000000016ace-5.dat family_sakula behavioral1/memory/2060-7-0x0000000000400000-0x0000000000420000-memory.dmp family_sakula behavioral1/memory/2396-12-0x0000000000400000-0x0000000000420000-memory.dmp family_sakula behavioral1/memory/2060-21-0x0000000000400000-0x0000000000420000-memory.dmp family_sakula -
Deletes itself 1 IoCs
pid Process 2928 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2060 MediaCenter.exe -
Loads dropped DLL 1 IoCs
pid Process 2396 bb3ce31f9d2c3f499b91359bb5efc8ccfff814eab8fb65ab5c0ae6b161e908a4N.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" bb3ce31f9d2c3f499b91359bb5efc8ccfff814eab8fb65ab5c0ae6b161e908a4N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bb3ce31f9d2c3f499b91359bb5efc8ccfff814eab8fb65ab5c0ae6b161e908a4N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MediaCenter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2928 cmd.exe 3004 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3004 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2396 bb3ce31f9d2c3f499b91359bb5efc8ccfff814eab8fb65ab5c0ae6b161e908a4N.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2396 wrote to memory of 2060 2396 bb3ce31f9d2c3f499b91359bb5efc8ccfff814eab8fb65ab5c0ae6b161e908a4N.exe 29 PID 2396 wrote to memory of 2060 2396 bb3ce31f9d2c3f499b91359bb5efc8ccfff814eab8fb65ab5c0ae6b161e908a4N.exe 29 PID 2396 wrote to memory of 2060 2396 bb3ce31f9d2c3f499b91359bb5efc8ccfff814eab8fb65ab5c0ae6b161e908a4N.exe 29 PID 2396 wrote to memory of 2060 2396 bb3ce31f9d2c3f499b91359bb5efc8ccfff814eab8fb65ab5c0ae6b161e908a4N.exe 29 PID 2396 wrote to memory of 2928 2396 bb3ce31f9d2c3f499b91359bb5efc8ccfff814eab8fb65ab5c0ae6b161e908a4N.exe 31 PID 2396 wrote to memory of 2928 2396 bb3ce31f9d2c3f499b91359bb5efc8ccfff814eab8fb65ab5c0ae6b161e908a4N.exe 31 PID 2396 wrote to memory of 2928 2396 bb3ce31f9d2c3f499b91359bb5efc8ccfff814eab8fb65ab5c0ae6b161e908a4N.exe 31 PID 2396 wrote to memory of 2928 2396 bb3ce31f9d2c3f499b91359bb5efc8ccfff814eab8fb65ab5c0ae6b161e908a4N.exe 31 PID 2928 wrote to memory of 3004 2928 cmd.exe 33 PID 2928 wrote to memory of 3004 2928 cmd.exe 33 PID 2928 wrote to memory of 3004 2928 cmd.exe 33 PID 2928 wrote to memory of 3004 2928 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb3ce31f9d2c3f499b91359bb5efc8ccfff814eab8fb65ab5c0ae6b161e908a4N.exe"C:\Users\Admin\AppData\Local\Temp\bb3ce31f9d2c3f499b91359bb5efc8ccfff814eab8fb65ab5c0ae6b161e908a4N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2060
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\bb3ce31f9d2c3f499b91359bb5efc8ccfff814eab8fb65ab5c0ae6b161e908a4N.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3004
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
912KB
MD57650dd86020357b6baeb28c93ca3e408
SHA1f551d87a6b207c0038afbb13aaa34305e42e269c
SHA256d28c3dc909e051b2ed0297805609e6a19494285180aab24af1c7a172d44d38f3
SHA512067fa409a6e41cf88fcd9d334b2dc82faecc9490ffaee2a76affb3f98add7ba9529519d45b478093f85723cc59f9fc69f6ef3a6671357d737ad1c1b050d05595