Analysis
-
max time kernel
131s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
12-02-2022 05:49
Static task
static1
Behavioral task
behavioral1
Sample
1195e7f703113daed4c3d4427907b1bc5b9e6ff99cc92b9dbc8a41c20ffb7927.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
1195e7f703113daed4c3d4427907b1bc5b9e6ff99cc92b9dbc8a41c20ffb7927.exe
Resource
win10v2004-en-20220113
General
-
Target
1195e7f703113daed4c3d4427907b1bc5b9e6ff99cc92b9dbc8a41c20ffb7927.exe
-
Size
36KB
-
MD5
91ff2c73fefa0143a917008f0bf58b32
-
SHA1
28af41da524e737917228e24b636238051ee0302
-
SHA256
1195e7f703113daed4c3d4427907b1bc5b9e6ff99cc92b9dbc8a41c20ffb7927
-
SHA512
b6aa6f0558fb592b503f1ba97975a61c6e247f7d9d3077effbaa6b7a5afbc87feb00a87e8c55f3f8a05547a6077649d84988bf186861d9c63b3dd2a62482a672
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 3624 MediaCenter.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
1195e7f703113daed4c3d4427907b1bc5b9e6ff99cc92b9dbc8a41c20ffb7927.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 1195e7f703113daed4c3d4427907b1bc5b9e6ff99cc92b9dbc8a41c20ffb7927.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
1195e7f703113daed4c3d4427907b1bc5b9e6ff99cc92b9dbc8a41c20ffb7927.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 1195e7f703113daed4c3d4427907b1bc5b9e6ff99cc92b9dbc8a41c20ffb7927.exe -
Drops file in Windows directory 8 IoCs
Processes:
TiWorker.exesvchost.exedescription ioc process File opened for modification C:\Windows\WinSxS\pending.xml TiWorker.exe File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
svchost.exe1195e7f703113daed4c3d4427907b1bc5b9e6ff99cc92b9dbc8a41c20ffb7927.exeTiWorker.exedescription pid process Token: SeShutdownPrivilege 4808 svchost.exe Token: SeCreatePagefilePrivilege 4808 svchost.exe Token: SeShutdownPrivilege 4808 svchost.exe Token: SeCreatePagefilePrivilege 4808 svchost.exe Token: SeShutdownPrivilege 4808 svchost.exe Token: SeCreatePagefilePrivilege 4808 svchost.exe Token: SeIncBasePriorityPrivilege 3636 1195e7f703113daed4c3d4427907b1bc5b9e6ff99cc92b9dbc8a41c20ffb7927.exe Token: SeSecurityPrivilege 2020 TiWorker.exe Token: SeRestorePrivilege 2020 TiWorker.exe Token: SeBackupPrivilege 2020 TiWorker.exe Token: SeBackupPrivilege 2020 TiWorker.exe Token: SeRestorePrivilege 2020 TiWorker.exe Token: SeSecurityPrivilege 2020 TiWorker.exe Token: SeBackupPrivilege 2020 TiWorker.exe Token: SeRestorePrivilege 2020 TiWorker.exe Token: SeSecurityPrivilege 2020 TiWorker.exe Token: SeBackupPrivilege 2020 TiWorker.exe Token: SeRestorePrivilege 2020 TiWorker.exe Token: SeSecurityPrivilege 2020 TiWorker.exe Token: SeBackupPrivilege 2020 TiWorker.exe Token: SeRestorePrivilege 2020 TiWorker.exe Token: SeSecurityPrivilege 2020 TiWorker.exe Token: SeBackupPrivilege 2020 TiWorker.exe Token: SeRestorePrivilege 2020 TiWorker.exe Token: SeSecurityPrivilege 2020 TiWorker.exe Token: SeBackupPrivilege 2020 TiWorker.exe Token: SeRestorePrivilege 2020 TiWorker.exe Token: SeSecurityPrivilege 2020 TiWorker.exe Token: SeBackupPrivilege 2020 TiWorker.exe Token: SeRestorePrivilege 2020 TiWorker.exe Token: SeSecurityPrivilege 2020 TiWorker.exe Token: SeBackupPrivilege 2020 TiWorker.exe Token: SeRestorePrivilege 2020 TiWorker.exe Token: SeSecurityPrivilege 2020 TiWorker.exe Token: SeBackupPrivilege 2020 TiWorker.exe Token: SeRestorePrivilege 2020 TiWorker.exe Token: SeSecurityPrivilege 2020 TiWorker.exe Token: SeBackupPrivilege 2020 TiWorker.exe Token: SeRestorePrivilege 2020 TiWorker.exe Token: SeSecurityPrivilege 2020 TiWorker.exe Token: SeBackupPrivilege 2020 TiWorker.exe Token: SeRestorePrivilege 2020 TiWorker.exe Token: SeSecurityPrivilege 2020 TiWorker.exe Token: SeBackupPrivilege 2020 TiWorker.exe Token: SeRestorePrivilege 2020 TiWorker.exe Token: SeSecurityPrivilege 2020 TiWorker.exe Token: SeBackupPrivilege 2020 TiWorker.exe Token: SeRestorePrivilege 2020 TiWorker.exe Token: SeSecurityPrivilege 2020 TiWorker.exe Token: SeBackupPrivilege 2020 TiWorker.exe Token: SeRestorePrivilege 2020 TiWorker.exe Token: SeSecurityPrivilege 2020 TiWorker.exe Token: SeBackupPrivilege 2020 TiWorker.exe Token: SeRestorePrivilege 2020 TiWorker.exe Token: SeSecurityPrivilege 2020 TiWorker.exe Token: SeBackupPrivilege 2020 TiWorker.exe Token: SeRestorePrivilege 2020 TiWorker.exe Token: SeSecurityPrivilege 2020 TiWorker.exe Token: SeBackupPrivilege 2020 TiWorker.exe Token: SeRestorePrivilege 2020 TiWorker.exe Token: SeSecurityPrivilege 2020 TiWorker.exe Token: SeBackupPrivilege 2020 TiWorker.exe Token: SeRestorePrivilege 2020 TiWorker.exe Token: SeSecurityPrivilege 2020 TiWorker.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
1195e7f703113daed4c3d4427907b1bc5b9e6ff99cc92b9dbc8a41c20ffb7927.execmd.exedescription pid process target process PID 3636 wrote to memory of 3624 3636 1195e7f703113daed4c3d4427907b1bc5b9e6ff99cc92b9dbc8a41c20ffb7927.exe MediaCenter.exe PID 3636 wrote to memory of 3624 3636 1195e7f703113daed4c3d4427907b1bc5b9e6ff99cc92b9dbc8a41c20ffb7927.exe MediaCenter.exe PID 3636 wrote to memory of 3624 3636 1195e7f703113daed4c3d4427907b1bc5b9e6ff99cc92b9dbc8a41c20ffb7927.exe MediaCenter.exe PID 3636 wrote to memory of 4968 3636 1195e7f703113daed4c3d4427907b1bc5b9e6ff99cc92b9dbc8a41c20ffb7927.exe cmd.exe PID 3636 wrote to memory of 4968 3636 1195e7f703113daed4c3d4427907b1bc5b9e6ff99cc92b9dbc8a41c20ffb7927.exe cmd.exe PID 3636 wrote to memory of 4968 3636 1195e7f703113daed4c3d4427907b1bc5b9e6ff99cc92b9dbc8a41c20ffb7927.exe cmd.exe PID 4968 wrote to memory of 1288 4968 cmd.exe PING.EXE PID 4968 wrote to memory of 1288 4968 cmd.exe PING.EXE PID 4968 wrote to memory of 1288 4968 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\1195e7f703113daed4c3d4427907b1bc5b9e6ff99cc92b9dbc8a41c20ffb7927.exe"C:\Users\Admin\AppData\Local\Temp\1195e7f703113daed4c3d4427907b1bc5b9e6ff99cc92b9dbc8a41c20ffb7927.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:3624 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\1195e7f703113daed4c3d4427907b1bc5b9e6ff99cc92b9dbc8a41c20ffb7927.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1288
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4808
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2020
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
0764141ad2c5fa0d293e21a63137400f
SHA1fc6fa72cbd9dc7860068a137a6f781dbc7097e24
SHA256da0ad49c4184647114eec4fc11f7fe9bc085a2ede6e65ffbdf535ef59c6c367e
SHA512074aa9ef0ceb734e1d2df1428a43fbd1f3ce5b7b6d192dc176b8b23635847f2f700451c96bd461cae5fc7ea91c3b01383aafb55a82df8691940ad61f4f147c62
-
MD5
0764141ad2c5fa0d293e21a63137400f
SHA1fc6fa72cbd9dc7860068a137a6f781dbc7097e24
SHA256da0ad49c4184647114eec4fc11f7fe9bc085a2ede6e65ffbdf535ef59c6c367e
SHA512074aa9ef0ceb734e1d2df1428a43fbd1f3ce5b7b6d192dc176b8b23635847f2f700451c96bd461cae5fc7ea91c3b01383aafb55a82df8691940ad61f4f147c62