Analysis
-
max time kernel
118s -
max time network
139s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
12-02-2022 04:39
Static task
static1
Behavioral task
behavioral1
Sample
14e1581f3143866e93dc1a54aa1aaf32113a6c0da4511b8f5a39db631a13212b.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
14e1581f3143866e93dc1a54aa1aaf32113a6c0da4511b8f5a39db631a13212b.exe
Resource
win10v2004-en-20220113
General
-
Target
14e1581f3143866e93dc1a54aa1aaf32113a6c0da4511b8f5a39db631a13212b.exe
-
Size
35KB
-
MD5
96b95ac7fc5ad2ca41fbaa5b87734002
-
SHA1
fb20cbe463c21d599a4a9f3daead87cb33548499
-
SHA256
14e1581f3143866e93dc1a54aa1aaf32113a6c0da4511b8f5a39db631a13212b
-
SHA512
41f4d08564b7aea8cb369d945bf264143c23b2c7fbca516e5b6048d571bd880eaec32a461267d1fdfbe307db0a6914a6fa027b83fe0adca51ba32b54865d2f04
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 2028 MediaCenter.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 976 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
14e1581f3143866e93dc1a54aa1aaf32113a6c0da4511b8f5a39db631a13212b.exepid process 1540 14e1581f3143866e93dc1a54aa1aaf32113a6c0da4511b8f5a39db631a13212b.exe 1540 14e1581f3143866e93dc1a54aa1aaf32113a6c0da4511b8f5a39db631a13212b.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
14e1581f3143866e93dc1a54aa1aaf32113a6c0da4511b8f5a39db631a13212b.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 14e1581f3143866e93dc1a54aa1aaf32113a6c0da4511b8f5a39db631a13212b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
14e1581f3143866e93dc1a54aa1aaf32113a6c0da4511b8f5a39db631a13212b.exedescription pid process Token: SeIncBasePriorityPrivilege 1540 14e1581f3143866e93dc1a54aa1aaf32113a6c0da4511b8f5a39db631a13212b.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
14e1581f3143866e93dc1a54aa1aaf32113a6c0da4511b8f5a39db631a13212b.execmd.exedescription pid process target process PID 1540 wrote to memory of 2028 1540 14e1581f3143866e93dc1a54aa1aaf32113a6c0da4511b8f5a39db631a13212b.exe MediaCenter.exe PID 1540 wrote to memory of 2028 1540 14e1581f3143866e93dc1a54aa1aaf32113a6c0da4511b8f5a39db631a13212b.exe MediaCenter.exe PID 1540 wrote to memory of 2028 1540 14e1581f3143866e93dc1a54aa1aaf32113a6c0da4511b8f5a39db631a13212b.exe MediaCenter.exe PID 1540 wrote to memory of 2028 1540 14e1581f3143866e93dc1a54aa1aaf32113a6c0da4511b8f5a39db631a13212b.exe MediaCenter.exe PID 1540 wrote to memory of 976 1540 14e1581f3143866e93dc1a54aa1aaf32113a6c0da4511b8f5a39db631a13212b.exe cmd.exe PID 1540 wrote to memory of 976 1540 14e1581f3143866e93dc1a54aa1aaf32113a6c0da4511b8f5a39db631a13212b.exe cmd.exe PID 1540 wrote to memory of 976 1540 14e1581f3143866e93dc1a54aa1aaf32113a6c0da4511b8f5a39db631a13212b.exe cmd.exe PID 1540 wrote to memory of 976 1540 14e1581f3143866e93dc1a54aa1aaf32113a6c0da4511b8f5a39db631a13212b.exe cmd.exe PID 976 wrote to memory of 924 976 cmd.exe PING.EXE PID 976 wrote to memory of 924 976 cmd.exe PING.EXE PID 976 wrote to memory of 924 976 cmd.exe PING.EXE PID 976 wrote to memory of 924 976 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\14e1581f3143866e93dc1a54aa1aaf32113a6c0da4511b8f5a39db631a13212b.exe"C:\Users\Admin\AppData\Local\Temp\14e1581f3143866e93dc1a54aa1aaf32113a6c0da4511b8f5a39db631a13212b.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:2028 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\14e1581f3143866e93dc1a54aa1aaf32113a6c0da4511b8f5a39db631a13212b.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:924
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
9c70877f12361149f8ab3ad27dfb7bd3
SHA1dcdf09b1e7680b8fa8d7f38aac79c4ee76798677
SHA256109b269063dcc6f6ca5a64fae7111b4ebb84817b485aa07a2fd1a061ac586a2d
SHA512b6344619f3ffca15a3b9f7e5f15b1c76da94dac4dec1c5de571a8344bc7d73139557c75b954dd302f5b29b2c99694324f052979ab314f34e63db5fd39f12c74a
-
MD5
9c70877f12361149f8ab3ad27dfb7bd3
SHA1dcdf09b1e7680b8fa8d7f38aac79c4ee76798677
SHA256109b269063dcc6f6ca5a64fae7111b4ebb84817b485aa07a2fd1a061ac586a2d
SHA512b6344619f3ffca15a3b9f7e5f15b1c76da94dac4dec1c5de571a8344bc7d73139557c75b954dd302f5b29b2c99694324f052979ab314f34e63db5fd39f12c74a
-
MD5
9c70877f12361149f8ab3ad27dfb7bd3
SHA1dcdf09b1e7680b8fa8d7f38aac79c4ee76798677
SHA256109b269063dcc6f6ca5a64fae7111b4ebb84817b485aa07a2fd1a061ac586a2d
SHA512b6344619f3ffca15a3b9f7e5f15b1c76da94dac4dec1c5de571a8344bc7d73139557c75b954dd302f5b29b2c99694324f052979ab314f34e63db5fd39f12c74a