Analysis
-
max time kernel
160s -
max time network
187s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
12-02-2022 04:56
Static task
static1
Behavioral task
behavioral1
Sample
13ffc08eaadcd0cd657f4a970e44c7266bd9cec16755595985ad218f5be124dd.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
13ffc08eaadcd0cd657f4a970e44c7266bd9cec16755595985ad218f5be124dd.exe
Resource
win10v2004-en-20220112
General
-
Target
13ffc08eaadcd0cd657f4a970e44c7266bd9cec16755595985ad218f5be124dd.exe
-
Size
60KB
-
MD5
b0fc0d8258025c8138b7c0f780383c3d
-
SHA1
335724c68aeaebc6b8155cb472979f6998df6e2f
-
SHA256
13ffc08eaadcd0cd657f4a970e44c7266bd9cec16755595985ad218f5be124dd
-
SHA512
4947bca4b299a5ec2278643f67a74e70c51fd035da1f6b1c95b7db33ea6fd843cf369c9d1676da8aa044e66d4ee57ffbf423b5db4ddd5c5af360786e0a4eaee8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 1212 MediaCenter.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1960 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
13ffc08eaadcd0cd657f4a970e44c7266bd9cec16755595985ad218f5be124dd.exepid process 1636 13ffc08eaadcd0cd657f4a970e44c7266bd9cec16755595985ad218f5be124dd.exe 1636 13ffc08eaadcd0cd657f4a970e44c7266bd9cec16755595985ad218f5be124dd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
13ffc08eaadcd0cd657f4a970e44c7266bd9cec16755595985ad218f5be124dd.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 13ffc08eaadcd0cd657f4a970e44c7266bd9cec16755595985ad218f5be124dd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
13ffc08eaadcd0cd657f4a970e44c7266bd9cec16755595985ad218f5be124dd.exedescription pid process Token: SeIncBasePriorityPrivilege 1636 13ffc08eaadcd0cd657f4a970e44c7266bd9cec16755595985ad218f5be124dd.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
13ffc08eaadcd0cd657f4a970e44c7266bd9cec16755595985ad218f5be124dd.execmd.exedescription pid process target process PID 1636 wrote to memory of 1212 1636 13ffc08eaadcd0cd657f4a970e44c7266bd9cec16755595985ad218f5be124dd.exe MediaCenter.exe PID 1636 wrote to memory of 1212 1636 13ffc08eaadcd0cd657f4a970e44c7266bd9cec16755595985ad218f5be124dd.exe MediaCenter.exe PID 1636 wrote to memory of 1212 1636 13ffc08eaadcd0cd657f4a970e44c7266bd9cec16755595985ad218f5be124dd.exe MediaCenter.exe PID 1636 wrote to memory of 1212 1636 13ffc08eaadcd0cd657f4a970e44c7266bd9cec16755595985ad218f5be124dd.exe MediaCenter.exe PID 1636 wrote to memory of 1960 1636 13ffc08eaadcd0cd657f4a970e44c7266bd9cec16755595985ad218f5be124dd.exe cmd.exe PID 1636 wrote to memory of 1960 1636 13ffc08eaadcd0cd657f4a970e44c7266bd9cec16755595985ad218f5be124dd.exe cmd.exe PID 1636 wrote to memory of 1960 1636 13ffc08eaadcd0cd657f4a970e44c7266bd9cec16755595985ad218f5be124dd.exe cmd.exe PID 1636 wrote to memory of 1960 1636 13ffc08eaadcd0cd657f4a970e44c7266bd9cec16755595985ad218f5be124dd.exe cmd.exe PID 1960 wrote to memory of 1660 1960 cmd.exe PING.EXE PID 1960 wrote to memory of 1660 1960 cmd.exe PING.EXE PID 1960 wrote to memory of 1660 1960 cmd.exe PING.EXE PID 1960 wrote to memory of 1660 1960 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\13ffc08eaadcd0cd657f4a970e44c7266bd9cec16755595985ad218f5be124dd.exe"C:\Users\Admin\AppData\Local\Temp\13ffc08eaadcd0cd657f4a970e44c7266bd9cec16755595985ad218f5be124dd.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:1212 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\13ffc08eaadcd0cd657f4a970e44c7266bd9cec16755595985ad218f5be124dd.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1660
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
f15ea27f6a8f9481a98398e71f50a0bf
SHA136f02531d7e076a31f75ae27a7dc0f1cb0e650fb
SHA2569fea96df259538ceaa45b2ed49d8472007be80add330fa95ee3f9a91382c9ada
SHA51240bf00e6145766065104bc06acac777a0c6fb7a043c97fbc6a06ccfced3952ae36aabeb5247b445f05018456113bb0240f3990607694a20301ea9e357b5828d1
-
MD5
f15ea27f6a8f9481a98398e71f50a0bf
SHA136f02531d7e076a31f75ae27a7dc0f1cb0e650fb
SHA2569fea96df259538ceaa45b2ed49d8472007be80add330fa95ee3f9a91382c9ada
SHA51240bf00e6145766065104bc06acac777a0c6fb7a043c97fbc6a06ccfced3952ae36aabeb5247b445f05018456113bb0240f3990607694a20301ea9e357b5828d1
-
MD5
f15ea27f6a8f9481a98398e71f50a0bf
SHA136f02531d7e076a31f75ae27a7dc0f1cb0e650fb
SHA2569fea96df259538ceaa45b2ed49d8472007be80add330fa95ee3f9a91382c9ada
SHA51240bf00e6145766065104bc06acac777a0c6fb7a043c97fbc6a06ccfced3952ae36aabeb5247b445f05018456113bb0240f3990607694a20301ea9e357b5828d1