Analysis
-
max time kernel
151s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
12-02-2022 04:02
Static task
static1
Behavioral task
behavioral1
Sample
162b75a3e1ae870aa0372e352a0559251d55bfdc634aaf19bee578bba5a3a45d.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
162b75a3e1ae870aa0372e352a0559251d55bfdc634aaf19bee578bba5a3a45d.exe
Resource
win10v2004-en-20220113
General
-
Target
162b75a3e1ae870aa0372e352a0559251d55bfdc634aaf19bee578bba5a3a45d.exe
-
Size
58KB
-
MD5
4f86e268674e21048afeb08f8b69b8e6
-
SHA1
edb5c731b80f8b0641c2af8aaf944409cb0c9e31
-
SHA256
162b75a3e1ae870aa0372e352a0559251d55bfdc634aaf19bee578bba5a3a45d
-
SHA512
90cfd8d9b065fd3073909bbe1cb3d44cd729150e083c131aa7edf8c78401df670fc9a3dc11b4d30bf458daff2c0999568b9a29633bbb34eb37f7aad64803313c
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 3896 MediaCenter.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
162b75a3e1ae870aa0372e352a0559251d55bfdc634aaf19bee578bba5a3a45d.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 162b75a3e1ae870aa0372e352a0559251d55bfdc634aaf19bee578bba5a3a45d.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
162b75a3e1ae870aa0372e352a0559251d55bfdc634aaf19bee578bba5a3a45d.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 162b75a3e1ae870aa0372e352a0559251d55bfdc634aaf19bee578bba5a3a45d.exe -
Drops file in Windows directory 8 IoCs
Processes:
TiWorker.exesvchost.exedescription ioc process File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe File opened for modification C:\Windows\WinSxS\pending.xml TiWorker.exe File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
svchost.exe162b75a3e1ae870aa0372e352a0559251d55bfdc634aaf19bee578bba5a3a45d.exeTiWorker.exedescription pid process Token: SeShutdownPrivilege 4092 svchost.exe Token: SeCreatePagefilePrivilege 4092 svchost.exe Token: SeShutdownPrivilege 4092 svchost.exe Token: SeCreatePagefilePrivilege 4092 svchost.exe Token: SeShutdownPrivilege 4092 svchost.exe Token: SeCreatePagefilePrivilege 4092 svchost.exe Token: SeIncBasePriorityPrivilege 1292 162b75a3e1ae870aa0372e352a0559251d55bfdc634aaf19bee578bba5a3a45d.exe Token: SeSecurityPrivilege 2044 TiWorker.exe Token: SeRestorePrivilege 2044 TiWorker.exe Token: SeBackupPrivilege 2044 TiWorker.exe Token: SeBackupPrivilege 2044 TiWorker.exe Token: SeRestorePrivilege 2044 TiWorker.exe Token: SeSecurityPrivilege 2044 TiWorker.exe Token: SeBackupPrivilege 2044 TiWorker.exe Token: SeRestorePrivilege 2044 TiWorker.exe Token: SeSecurityPrivilege 2044 TiWorker.exe Token: SeBackupPrivilege 2044 TiWorker.exe Token: SeRestorePrivilege 2044 TiWorker.exe Token: SeSecurityPrivilege 2044 TiWorker.exe Token: SeBackupPrivilege 2044 TiWorker.exe Token: SeRestorePrivilege 2044 TiWorker.exe Token: SeSecurityPrivilege 2044 TiWorker.exe Token: SeBackupPrivilege 2044 TiWorker.exe Token: SeRestorePrivilege 2044 TiWorker.exe Token: SeSecurityPrivilege 2044 TiWorker.exe Token: SeBackupPrivilege 2044 TiWorker.exe Token: SeRestorePrivilege 2044 TiWorker.exe Token: SeSecurityPrivilege 2044 TiWorker.exe Token: SeBackupPrivilege 2044 TiWorker.exe Token: SeRestorePrivilege 2044 TiWorker.exe Token: SeSecurityPrivilege 2044 TiWorker.exe Token: SeBackupPrivilege 2044 TiWorker.exe Token: SeRestorePrivilege 2044 TiWorker.exe Token: SeSecurityPrivilege 2044 TiWorker.exe Token: SeBackupPrivilege 2044 TiWorker.exe Token: SeRestorePrivilege 2044 TiWorker.exe Token: SeSecurityPrivilege 2044 TiWorker.exe Token: SeBackupPrivilege 2044 TiWorker.exe Token: SeRestorePrivilege 2044 TiWorker.exe Token: SeSecurityPrivilege 2044 TiWorker.exe Token: SeBackupPrivilege 2044 TiWorker.exe Token: SeRestorePrivilege 2044 TiWorker.exe Token: SeSecurityPrivilege 2044 TiWorker.exe Token: SeBackupPrivilege 2044 TiWorker.exe Token: SeRestorePrivilege 2044 TiWorker.exe Token: SeSecurityPrivilege 2044 TiWorker.exe Token: SeBackupPrivilege 2044 TiWorker.exe Token: SeRestorePrivilege 2044 TiWorker.exe Token: SeSecurityPrivilege 2044 TiWorker.exe Token: SeBackupPrivilege 2044 TiWorker.exe Token: SeRestorePrivilege 2044 TiWorker.exe Token: SeSecurityPrivilege 2044 TiWorker.exe Token: SeBackupPrivilege 2044 TiWorker.exe Token: SeRestorePrivilege 2044 TiWorker.exe Token: SeSecurityPrivilege 2044 TiWorker.exe Token: SeBackupPrivilege 2044 TiWorker.exe Token: SeRestorePrivilege 2044 TiWorker.exe Token: SeSecurityPrivilege 2044 TiWorker.exe Token: SeBackupPrivilege 2044 TiWorker.exe Token: SeRestorePrivilege 2044 TiWorker.exe Token: SeSecurityPrivilege 2044 TiWorker.exe Token: SeBackupPrivilege 2044 TiWorker.exe Token: SeRestorePrivilege 2044 TiWorker.exe Token: SeSecurityPrivilege 2044 TiWorker.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
162b75a3e1ae870aa0372e352a0559251d55bfdc634aaf19bee578bba5a3a45d.execmd.exedescription pid process target process PID 1292 wrote to memory of 3896 1292 162b75a3e1ae870aa0372e352a0559251d55bfdc634aaf19bee578bba5a3a45d.exe MediaCenter.exe PID 1292 wrote to memory of 3896 1292 162b75a3e1ae870aa0372e352a0559251d55bfdc634aaf19bee578bba5a3a45d.exe MediaCenter.exe PID 1292 wrote to memory of 3896 1292 162b75a3e1ae870aa0372e352a0559251d55bfdc634aaf19bee578bba5a3a45d.exe MediaCenter.exe PID 1292 wrote to memory of 4996 1292 162b75a3e1ae870aa0372e352a0559251d55bfdc634aaf19bee578bba5a3a45d.exe cmd.exe PID 1292 wrote to memory of 4996 1292 162b75a3e1ae870aa0372e352a0559251d55bfdc634aaf19bee578bba5a3a45d.exe cmd.exe PID 1292 wrote to memory of 4996 1292 162b75a3e1ae870aa0372e352a0559251d55bfdc634aaf19bee578bba5a3a45d.exe cmd.exe PID 4996 wrote to memory of 920 4996 cmd.exe PING.EXE PID 4996 wrote to memory of 920 4996 cmd.exe PING.EXE PID 4996 wrote to memory of 920 4996 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\162b75a3e1ae870aa0372e352a0559251d55bfdc634aaf19bee578bba5a3a45d.exe"C:\Users\Admin\AppData\Local\Temp\162b75a3e1ae870aa0372e352a0559251d55bfdc634aaf19bee578bba5a3a45d.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:3896 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\162b75a3e1ae870aa0372e352a0559251d55bfdc634aaf19bee578bba5a3a45d.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:920
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4092
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2044
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
ab8e0913a847e3604b351824966c3929
SHA1670ea77040185c87770ad3218ae05cd5f2f034ea
SHA25670eea191c297681dd5619dd578c9ce10eb577bf0bcec5c315e67e70cf8e09a6c
SHA512675b668a99ba57c38a97178b8e475b2d9d6a01d715dedc602e5c4b16817086483fab4e4b22703f484bd55a5dbf48660b35696704f9aebfd8d00558ce80c98a3f
-
MD5
ab8e0913a847e3604b351824966c3929
SHA1670ea77040185c87770ad3218ae05cd5f2f034ea
SHA25670eea191c297681dd5619dd578c9ce10eb577bf0bcec5c315e67e70cf8e09a6c
SHA512675b668a99ba57c38a97178b8e475b2d9d6a01d715dedc602e5c4b16817086483fab4e4b22703f484bd55a5dbf48660b35696704f9aebfd8d00558ce80c98a3f