Analysis

  • max time kernel
    144s
  • max time network
    139s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    13/07/2020, 11:42

General

  • Target

    5614bd0a2e2c2ca4194e99e2f848535fa9a16157bd78cae268cf2b3eda6e54c2.exe

  • Size

    77KB

  • MD5

    de2147bd349bd429db6ed0149736465e

  • SHA1

    b386fab1ca019046c87fbda87be360ba276defd6

  • SHA256

    5614bd0a2e2c2ca4194e99e2f848535fa9a16157bd78cae268cf2b3eda6e54c2

  • SHA512

    44087c162fb48a05766c893e1ba64f9c2df28ff0bb8951287af517420f0bae5aa362e1a3ed89cda1b73900bd2ce8a4f9f3a14f5e74d8392de361f007647fa76a

Score
8/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 18 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Adds Run entry to start application 2 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5614bd0a2e2c2ca4194e99e2f848535fa9a16157bd78cae268cf2b3eda6e54c2.exe
    "C:\Users\Admin\AppData\Local\Temp\5614bd0a2e2c2ca4194e99e2f848535fa9a16157bd78cae268cf2b3eda6e54c2.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:976
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v "MicroMedia" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3768
      • C:\Windows\SysWOW64\reg.exe
        reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v "MicroMedia" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"
        3⤵
        • Modifies registry key
        • Adds Run entry to start application
        PID:1128
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3828
      • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
        C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
        3⤵
        • Executes dropped EXE
        PID:620
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c ping 127.0.0.1 & del "C:\Users\Admin\AppData\Local\Temp\5614bd0a2e2c2ca4194e99e2f848535fa9a16157bd78cae268cf2b3eda6e54c2.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:420
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:1168

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads