Analysis
-
max time kernel
95s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-01-2025 07:53
Behavioral task
behavioral1
Sample
bb3ce31f9d2c3f499b91359bb5efc8ccfff814eab8fb65ab5c0ae6b161e908a4N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
bb3ce31f9d2c3f499b91359bb5efc8ccfff814eab8fb65ab5c0ae6b161e908a4N.exe
Resource
win10v2004-20241007-en
General
-
Target
bb3ce31f9d2c3f499b91359bb5efc8ccfff814eab8fb65ab5c0ae6b161e908a4N.exe
-
Size
912KB
-
MD5
af5fc906cb4eb002b1a4b14a8bc45020
-
SHA1
aee9ca177b7d8b33fd4462518b1fdde8ec475946
-
SHA256
bb3ce31f9d2c3f499b91359bb5efc8ccfff814eab8fb65ab5c0ae6b161e908a4
-
SHA512
ac3b2b5c4449c9bc3a3c344e3d72adeb82c71a0defa83f51e385e68551319791aebaef484177b8a688389adc72e4b99712339cd33029d220439e8b6e0af053ee
-
SSDEEP
12288:0RfQn+w8EYiBlMkn5f9J105ko8T6csV5f1bYQog9hVn454E4Ciy:g4+wlYBsb3zNs5f1bYInVn454Egy
Malware Config
Extracted
sakula
www.polarroute.com
Signatures
-
Sakula family
-
Sakula payload 4 IoCs
resource yara_rule behavioral2/memory/4036-0-0x0000000000400000-0x0000000000420000-memory.dmp family_sakula behavioral2/files/0x000a000000023caf-3.dat family_sakula behavioral2/memory/4036-9-0x0000000000400000-0x0000000000420000-memory.dmp family_sakula behavioral2/memory/3232-18-0x0000000000400000-0x0000000000420000-memory.dmp family_sakula -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation bb3ce31f9d2c3f499b91359bb5efc8ccfff814eab8fb65ab5c0ae6b161e908a4N.exe -
Executes dropped EXE 1 IoCs
pid Process 3232 MediaCenter.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" bb3ce31f9d2c3f499b91359bb5efc8ccfff814eab8fb65ab5c0ae6b161e908a4N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bb3ce31f9d2c3f499b91359bb5efc8ccfff814eab8fb65ab5c0ae6b161e908a4N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MediaCenter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 524 cmd.exe 3428 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3428 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4036 bb3ce31f9d2c3f499b91359bb5efc8ccfff814eab8fb65ab5c0ae6b161e908a4N.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4036 wrote to memory of 3232 4036 bb3ce31f9d2c3f499b91359bb5efc8ccfff814eab8fb65ab5c0ae6b161e908a4N.exe 83 PID 4036 wrote to memory of 3232 4036 bb3ce31f9d2c3f499b91359bb5efc8ccfff814eab8fb65ab5c0ae6b161e908a4N.exe 83 PID 4036 wrote to memory of 3232 4036 bb3ce31f9d2c3f499b91359bb5efc8ccfff814eab8fb65ab5c0ae6b161e908a4N.exe 83 PID 4036 wrote to memory of 524 4036 bb3ce31f9d2c3f499b91359bb5efc8ccfff814eab8fb65ab5c0ae6b161e908a4N.exe 99 PID 4036 wrote to memory of 524 4036 bb3ce31f9d2c3f499b91359bb5efc8ccfff814eab8fb65ab5c0ae6b161e908a4N.exe 99 PID 4036 wrote to memory of 524 4036 bb3ce31f9d2c3f499b91359bb5efc8ccfff814eab8fb65ab5c0ae6b161e908a4N.exe 99 PID 524 wrote to memory of 3428 524 cmd.exe 101 PID 524 wrote to memory of 3428 524 cmd.exe 101 PID 524 wrote to memory of 3428 524 cmd.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb3ce31f9d2c3f499b91359bb5efc8ccfff814eab8fb65ab5c0ae6b161e908a4N.exe"C:\Users\Admin\AppData\Local\Temp\bb3ce31f9d2c3f499b91359bb5efc8ccfff814eab8fb65ab5c0ae6b161e908a4N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3232
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\bb3ce31f9d2c3f499b91359bb5efc8ccfff814eab8fb65ab5c0ae6b161e908a4N.exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3428
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
912KB
MD5db2c4684cc7d2d99d39926b59d54d2d9
SHA1bff3ed27648f66fac9f6247491f0207c533c5fe9
SHA25660e77a62142feed80051d57b86f91fff579fa182d3c29f4d2952f7a4ac44e76a
SHA512fbdf725b36553c04d533a43fd74d0135f5540f04852d7aefba0b4741f28c8fd47c24eca19e616857b490580d158269ba4728f7524742768222880e671d3f1349