Analysis
-
max time kernel
123s -
max time network
143s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
12-02-2022 04:38
Static task
static1
Behavioral task
behavioral1
Sample
14f20e47b55b16a22ef0d18691fa7f54491b72159c3733af1cbb74427ca78f9d.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
14f20e47b55b16a22ef0d18691fa7f54491b72159c3733af1cbb74427ca78f9d.exe
Resource
win10v2004-en-20220113
General
-
Target
14f20e47b55b16a22ef0d18691fa7f54491b72159c3733af1cbb74427ca78f9d.exe
-
Size
36KB
-
MD5
b2435a62310bd15e2a8e9de931bdde90
-
SHA1
e551cc2496bc54f4783c6b7fdb8967266719fa06
-
SHA256
14f20e47b55b16a22ef0d18691fa7f54491b72159c3733af1cbb74427ca78f9d
-
SHA512
cffcd257ca721fea40a5bf67082accad50e2dc0b26f1ae11b3bff0b3fb53c78300265c8c4400a2b249a17aa0e13b30c5d9c28e109463c15b9b23b769562e3497
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 828 MediaCenter.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1032 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
14f20e47b55b16a22ef0d18691fa7f54491b72159c3733af1cbb74427ca78f9d.exepid process 1664 14f20e47b55b16a22ef0d18691fa7f54491b72159c3733af1cbb74427ca78f9d.exe 1664 14f20e47b55b16a22ef0d18691fa7f54491b72159c3733af1cbb74427ca78f9d.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
14f20e47b55b16a22ef0d18691fa7f54491b72159c3733af1cbb74427ca78f9d.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 14f20e47b55b16a22ef0d18691fa7f54491b72159c3733af1cbb74427ca78f9d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
14f20e47b55b16a22ef0d18691fa7f54491b72159c3733af1cbb74427ca78f9d.exedescription pid process Token: SeIncBasePriorityPrivilege 1664 14f20e47b55b16a22ef0d18691fa7f54491b72159c3733af1cbb74427ca78f9d.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
14f20e47b55b16a22ef0d18691fa7f54491b72159c3733af1cbb74427ca78f9d.execmd.exedescription pid process target process PID 1664 wrote to memory of 828 1664 14f20e47b55b16a22ef0d18691fa7f54491b72159c3733af1cbb74427ca78f9d.exe MediaCenter.exe PID 1664 wrote to memory of 828 1664 14f20e47b55b16a22ef0d18691fa7f54491b72159c3733af1cbb74427ca78f9d.exe MediaCenter.exe PID 1664 wrote to memory of 828 1664 14f20e47b55b16a22ef0d18691fa7f54491b72159c3733af1cbb74427ca78f9d.exe MediaCenter.exe PID 1664 wrote to memory of 828 1664 14f20e47b55b16a22ef0d18691fa7f54491b72159c3733af1cbb74427ca78f9d.exe MediaCenter.exe PID 1664 wrote to memory of 1032 1664 14f20e47b55b16a22ef0d18691fa7f54491b72159c3733af1cbb74427ca78f9d.exe cmd.exe PID 1664 wrote to memory of 1032 1664 14f20e47b55b16a22ef0d18691fa7f54491b72159c3733af1cbb74427ca78f9d.exe cmd.exe PID 1664 wrote to memory of 1032 1664 14f20e47b55b16a22ef0d18691fa7f54491b72159c3733af1cbb74427ca78f9d.exe cmd.exe PID 1664 wrote to memory of 1032 1664 14f20e47b55b16a22ef0d18691fa7f54491b72159c3733af1cbb74427ca78f9d.exe cmd.exe PID 1032 wrote to memory of 1328 1032 cmd.exe PING.EXE PID 1032 wrote to memory of 1328 1032 cmd.exe PING.EXE PID 1032 wrote to memory of 1328 1032 cmd.exe PING.EXE PID 1032 wrote to memory of 1328 1032 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\14f20e47b55b16a22ef0d18691fa7f54491b72159c3733af1cbb74427ca78f9d.exe"C:\Users\Admin\AppData\Local\Temp\14f20e47b55b16a22ef0d18691fa7f54491b72159c3733af1cbb74427ca78f9d.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:828 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\14f20e47b55b16a22ef0d18691fa7f54491b72159c3733af1cbb74427ca78f9d.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1328
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
c1c692e9f82bc5265a8f1ea5ef6ba8e7
SHA1307d3fca893d38126ac9cc05033af5ca791a73a8
SHA25683b04c5d5b3808e1250f58c08f685064b18f5baf024ccacd729f6ee7b34694ae
SHA51293768aaa0e92612db3d656795e19fd25580f4637c9578c4c56b81464be554124bb0d113143056103d774284a04f108a5f625ea1fe363215d3094db41e643013d
-
MD5
c1c692e9f82bc5265a8f1ea5ef6ba8e7
SHA1307d3fca893d38126ac9cc05033af5ca791a73a8
SHA25683b04c5d5b3808e1250f58c08f685064b18f5baf024ccacd729f6ee7b34694ae
SHA51293768aaa0e92612db3d656795e19fd25580f4637c9578c4c56b81464be554124bb0d113143056103d774284a04f108a5f625ea1fe363215d3094db41e643013d
-
MD5
c1c692e9f82bc5265a8f1ea5ef6ba8e7
SHA1307d3fca893d38126ac9cc05033af5ca791a73a8
SHA25683b04c5d5b3808e1250f58c08f685064b18f5baf024ccacd729f6ee7b34694ae
SHA51293768aaa0e92612db3d656795e19fd25580f4637c9578c4c56b81464be554124bb0d113143056103d774284a04f108a5f625ea1fe363215d3094db41e643013d