Analysis
-
max time kernel
119s -
max time network
134s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
12-02-2022 06:29
Static task
static1
Behavioral task
behavioral1
Sample
0fd709aa8bd53c6973f5ddc829b0309cefeb5e81565b857f04a9c1c1eaba8813.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
0fd709aa8bd53c6973f5ddc829b0309cefeb5e81565b857f04a9c1c1eaba8813.exe
Resource
win10v2004-en-20220113
General
-
Target
0fd709aa8bd53c6973f5ddc829b0309cefeb5e81565b857f04a9c1c1eaba8813.exe
-
Size
60KB
-
MD5
1dfbddf013edb1383cf8faed6546e2df
-
SHA1
0255db0ad1e64d9af9155a9ea2042583f6e8f15d
-
SHA256
0fd709aa8bd53c6973f5ddc829b0309cefeb5e81565b857f04a9c1c1eaba8813
-
SHA512
b1e17eb017f1db3e7d0eee347492c3b3f6abce90206981453a357e77ab7ede4a29035398311e9243dbea82c5dc0bdb7fc248470e97372989f221c4048ae01c1c
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 1892 MediaCenter.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1648 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
0fd709aa8bd53c6973f5ddc829b0309cefeb5e81565b857f04a9c1c1eaba8813.exepid process 1712 0fd709aa8bd53c6973f5ddc829b0309cefeb5e81565b857f04a9c1c1eaba8813.exe 1712 0fd709aa8bd53c6973f5ddc829b0309cefeb5e81565b857f04a9c1c1eaba8813.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
0fd709aa8bd53c6973f5ddc829b0309cefeb5e81565b857f04a9c1c1eaba8813.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 0fd709aa8bd53c6973f5ddc829b0309cefeb5e81565b857f04a9c1c1eaba8813.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
0fd709aa8bd53c6973f5ddc829b0309cefeb5e81565b857f04a9c1c1eaba8813.exedescription pid process Token: SeIncBasePriorityPrivilege 1712 0fd709aa8bd53c6973f5ddc829b0309cefeb5e81565b857f04a9c1c1eaba8813.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
0fd709aa8bd53c6973f5ddc829b0309cefeb5e81565b857f04a9c1c1eaba8813.execmd.exedescription pid process target process PID 1712 wrote to memory of 1892 1712 0fd709aa8bd53c6973f5ddc829b0309cefeb5e81565b857f04a9c1c1eaba8813.exe MediaCenter.exe PID 1712 wrote to memory of 1892 1712 0fd709aa8bd53c6973f5ddc829b0309cefeb5e81565b857f04a9c1c1eaba8813.exe MediaCenter.exe PID 1712 wrote to memory of 1892 1712 0fd709aa8bd53c6973f5ddc829b0309cefeb5e81565b857f04a9c1c1eaba8813.exe MediaCenter.exe PID 1712 wrote to memory of 1892 1712 0fd709aa8bd53c6973f5ddc829b0309cefeb5e81565b857f04a9c1c1eaba8813.exe MediaCenter.exe PID 1712 wrote to memory of 1648 1712 0fd709aa8bd53c6973f5ddc829b0309cefeb5e81565b857f04a9c1c1eaba8813.exe cmd.exe PID 1712 wrote to memory of 1648 1712 0fd709aa8bd53c6973f5ddc829b0309cefeb5e81565b857f04a9c1c1eaba8813.exe cmd.exe PID 1712 wrote to memory of 1648 1712 0fd709aa8bd53c6973f5ddc829b0309cefeb5e81565b857f04a9c1c1eaba8813.exe cmd.exe PID 1712 wrote to memory of 1648 1712 0fd709aa8bd53c6973f5ddc829b0309cefeb5e81565b857f04a9c1c1eaba8813.exe cmd.exe PID 1648 wrote to memory of 1128 1648 cmd.exe PING.EXE PID 1648 wrote to memory of 1128 1648 cmd.exe PING.EXE PID 1648 wrote to memory of 1128 1648 cmd.exe PING.EXE PID 1648 wrote to memory of 1128 1648 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\0fd709aa8bd53c6973f5ddc829b0309cefeb5e81565b857f04a9c1c1eaba8813.exe"C:\Users\Admin\AppData\Local\Temp\0fd709aa8bd53c6973f5ddc829b0309cefeb5e81565b857f04a9c1c1eaba8813.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:1892 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\0fd709aa8bd53c6973f5ddc829b0309cefeb5e81565b857f04a9c1c1eaba8813.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1128
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
ffe0b048f227c2b44fa518f48406959c
SHA110507301c7fe02fb5b8566d3fd17447a4b1a523a
SHA2560b836feb564779a994f9296c19db1a01c04dc6b9d72ae3771f02a531239d8cf0
SHA512135ff68d5197c302abec19f503158db00e279159ed0c37d23a0004bb0d7c8cfdd6ce1408f6a1696a2eb16de021eef094833114d8b8171fe4eb761701f7c2eaea
-
MD5
ffe0b048f227c2b44fa518f48406959c
SHA110507301c7fe02fb5b8566d3fd17447a4b1a523a
SHA2560b836feb564779a994f9296c19db1a01c04dc6b9d72ae3771f02a531239d8cf0
SHA512135ff68d5197c302abec19f503158db00e279159ed0c37d23a0004bb0d7c8cfdd6ce1408f6a1696a2eb16de021eef094833114d8b8171fe4eb761701f7c2eaea
-
MD5
ffe0b048f227c2b44fa518f48406959c
SHA110507301c7fe02fb5b8566d3fd17447a4b1a523a
SHA2560b836feb564779a994f9296c19db1a01c04dc6b9d72ae3771f02a531239d8cf0
SHA512135ff68d5197c302abec19f503158db00e279159ed0c37d23a0004bb0d7c8cfdd6ce1408f6a1696a2eb16de021eef094833114d8b8171fe4eb761701f7c2eaea