Analysis
-
max time kernel
144s -
max time network
174s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
12-02-2022 05:27
Static task
static1
Behavioral task
behavioral1
Sample
12b0190a9052289553de89622ad5d9aba3ee5b4a9844117a98993ec267e772c3.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
12b0190a9052289553de89622ad5d9aba3ee5b4a9844117a98993ec267e772c3.exe
Resource
win10v2004-en-20220112
General
-
Target
12b0190a9052289553de89622ad5d9aba3ee5b4a9844117a98993ec267e772c3.exe
-
Size
58KB
-
MD5
68514d6a607c29e2e30a18b2ddb898cf
-
SHA1
1f4402163162fae48967f558328ceb13cd92f5ac
-
SHA256
12b0190a9052289553de89622ad5d9aba3ee5b4a9844117a98993ec267e772c3
-
SHA512
2e99cdfae273eb3e08d56a10e6e8fba8950727d9c5ad2fb84d3832a35d18b75648e39bd659209770774f0867f2b198259057861cdf875a535db2c9c388e2905b
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 904 MediaCenter.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1092 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
12b0190a9052289553de89622ad5d9aba3ee5b4a9844117a98993ec267e772c3.exepid process 1532 12b0190a9052289553de89622ad5d9aba3ee5b4a9844117a98993ec267e772c3.exe 1532 12b0190a9052289553de89622ad5d9aba3ee5b4a9844117a98993ec267e772c3.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
12b0190a9052289553de89622ad5d9aba3ee5b4a9844117a98993ec267e772c3.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 12b0190a9052289553de89622ad5d9aba3ee5b4a9844117a98993ec267e772c3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
12b0190a9052289553de89622ad5d9aba3ee5b4a9844117a98993ec267e772c3.exedescription pid process Token: SeIncBasePriorityPrivilege 1532 12b0190a9052289553de89622ad5d9aba3ee5b4a9844117a98993ec267e772c3.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
12b0190a9052289553de89622ad5d9aba3ee5b4a9844117a98993ec267e772c3.execmd.exedescription pid process target process PID 1532 wrote to memory of 904 1532 12b0190a9052289553de89622ad5d9aba3ee5b4a9844117a98993ec267e772c3.exe MediaCenter.exe PID 1532 wrote to memory of 904 1532 12b0190a9052289553de89622ad5d9aba3ee5b4a9844117a98993ec267e772c3.exe MediaCenter.exe PID 1532 wrote to memory of 904 1532 12b0190a9052289553de89622ad5d9aba3ee5b4a9844117a98993ec267e772c3.exe MediaCenter.exe PID 1532 wrote to memory of 904 1532 12b0190a9052289553de89622ad5d9aba3ee5b4a9844117a98993ec267e772c3.exe MediaCenter.exe PID 1532 wrote to memory of 1092 1532 12b0190a9052289553de89622ad5d9aba3ee5b4a9844117a98993ec267e772c3.exe cmd.exe PID 1532 wrote to memory of 1092 1532 12b0190a9052289553de89622ad5d9aba3ee5b4a9844117a98993ec267e772c3.exe cmd.exe PID 1532 wrote to memory of 1092 1532 12b0190a9052289553de89622ad5d9aba3ee5b4a9844117a98993ec267e772c3.exe cmd.exe PID 1532 wrote to memory of 1092 1532 12b0190a9052289553de89622ad5d9aba3ee5b4a9844117a98993ec267e772c3.exe cmd.exe PID 1092 wrote to memory of 1052 1092 cmd.exe PING.EXE PID 1092 wrote to memory of 1052 1092 cmd.exe PING.EXE PID 1092 wrote to memory of 1052 1092 cmd.exe PING.EXE PID 1092 wrote to memory of 1052 1092 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\12b0190a9052289553de89622ad5d9aba3ee5b4a9844117a98993ec267e772c3.exe"C:\Users\Admin\AppData\Local\Temp\12b0190a9052289553de89622ad5d9aba3ee5b4a9844117a98993ec267e772c3.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:904 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\12b0190a9052289553de89622ad5d9aba3ee5b4a9844117a98993ec267e772c3.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1052
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
e17e05ae633f474ab8df85fc0f98cd98
SHA123d843a06fac87e83cddfe9641b99d6e3826b767
SHA2562411d74c761dbf4e6bf6865d79f20fd42a00fffe217161ad79e79cac80a6acd6
SHA51219da308a787fcc6b39cd85b2c9239242ef34daaab4398187a01c0098f21193a32b61eee06679259342694e60bf803bbcf7cc3d7666234dd5e2af6b321e378b9a
-
MD5
e17e05ae633f474ab8df85fc0f98cd98
SHA123d843a06fac87e83cddfe9641b99d6e3826b767
SHA2562411d74c761dbf4e6bf6865d79f20fd42a00fffe217161ad79e79cac80a6acd6
SHA51219da308a787fcc6b39cd85b2c9239242ef34daaab4398187a01c0098f21193a32b61eee06679259342694e60bf803bbcf7cc3d7666234dd5e2af6b321e378b9a
-
MD5
e17e05ae633f474ab8df85fc0f98cd98
SHA123d843a06fac87e83cddfe9641b99d6e3826b767
SHA2562411d74c761dbf4e6bf6865d79f20fd42a00fffe217161ad79e79cac80a6acd6
SHA51219da308a787fcc6b39cd85b2c9239242ef34daaab4398187a01c0098f21193a32b61eee06679259342694e60bf803bbcf7cc3d7666234dd5e2af6b321e378b9a