Resubmissions

24-02-2022 11:03

220224-m5yycachb2 10

30-09-2021 12:29

210930-pnxeashfh6 8

Analysis

  • max time kernel
    127s
  • max time network
    171s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    30-09-2021 12:29

General

  • Target

    7b8d0ee237e85d52c4ae65170c50a97437697299cb92badf91e7510f798bb452.exe

  • Size

    150KB

  • MD5

    202ca1b19f8ecc7e648043485ff91082

  • SHA1

    df4be15599023beca2a24de920199fcd88f1f034

  • SHA256

    7b8d0ee237e85d52c4ae65170c50a97437697299cb92badf91e7510f798bb452

  • SHA512

    8ae627b9e0ba4d79b31bf4f36db947374f3904e405f77b293f2bb2fa6b87afb69cc0b694db661dc2d53b0f51bf2e2a60053628dabc99363c74c4f70cf1bc1554

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7b8d0ee237e85d52c4ae65170c50a97437697299cb92badf91e7510f798bb452.exe
    "C:\Users\Admin\AppData\Local\Temp\7b8d0ee237e85d52c4ae65170c50a97437697299cb92badf91e7510f798bb452.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:240
    • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
      2⤵
      • Executes dropped EXE
      PID:1760
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\7b8d0ee237e85d52c4ae65170c50a97437697299cb92badf91e7510f798bb452.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:1284
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:616

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    f95f85e99e4c600d4ddae296367eda78

    SHA1

    f783318c97cdc3246db027bcaeb5c8e5c6329209

    SHA256

    0fc9a406c7bc39fcac49cc513ccef60e0f281d9990bf3a120a8bd61facc5bd2c

    SHA512

    a160383f5bca31e79d62b95cfde3d6eb11592c62097b07cf70ee2b833a1dae4fa334f4e60045c71061d130cbf1ff1fbab24e834355b43cd7c1bf7b20a6a640a8

  • \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe

    MD5

    f95f85e99e4c600d4ddae296367eda78

    SHA1

    f783318c97cdc3246db027bcaeb5c8e5c6329209

    SHA256

    0fc9a406c7bc39fcac49cc513ccef60e0f281d9990bf3a120a8bd61facc5bd2c

    SHA512

    a160383f5bca31e79d62b95cfde3d6eb11592c62097b07cf70ee2b833a1dae4fa334f4e60045c71061d130cbf1ff1fbab24e834355b43cd7c1bf7b20a6a640a8

  • memory/240-60-0x0000000075211000-0x0000000075213000-memory.dmp

    Filesize

    8KB

  • memory/616-66-0x0000000000000000-mapping.dmp

  • memory/1284-65-0x0000000000000000-mapping.dmp

  • memory/1760-62-0x0000000000000000-mapping.dmp