Analysis
-
max time kernel
141s -
max time network
159s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
12-02-2022 07:15
Static task
static1
Behavioral task
behavioral1
Sample
0e18acfbb5ec6fc399ce75eaadc247ccc4a5cd05201dc58d28ef9824e3764365.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
0e18acfbb5ec6fc399ce75eaadc247ccc4a5cd05201dc58d28ef9824e3764365.exe
Resource
win10v2004-en-20220113
General
-
Target
0e18acfbb5ec6fc399ce75eaadc247ccc4a5cd05201dc58d28ef9824e3764365.exe
-
Size
58KB
-
MD5
853fbd3bcea827937815a937a3d3c32f
-
SHA1
b34b66e65507e2b3413728d8965279cb737308b1
-
SHA256
0e18acfbb5ec6fc399ce75eaadc247ccc4a5cd05201dc58d28ef9824e3764365
-
SHA512
49e4b577ea31b520df811370dc21db0daf23e2f2b708a68bbfe166072407d0eea5b1d30d43669f1637c32139b069fed532149717b8b7b317d0286bbf852d2bf9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 1180 MediaCenter.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 988 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
0e18acfbb5ec6fc399ce75eaadc247ccc4a5cd05201dc58d28ef9824e3764365.exepid process 800 0e18acfbb5ec6fc399ce75eaadc247ccc4a5cd05201dc58d28ef9824e3764365.exe 800 0e18acfbb5ec6fc399ce75eaadc247ccc4a5cd05201dc58d28ef9824e3764365.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
0e18acfbb5ec6fc399ce75eaadc247ccc4a5cd05201dc58d28ef9824e3764365.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 0e18acfbb5ec6fc399ce75eaadc247ccc4a5cd05201dc58d28ef9824e3764365.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
0e18acfbb5ec6fc399ce75eaadc247ccc4a5cd05201dc58d28ef9824e3764365.exedescription pid process Token: SeIncBasePriorityPrivilege 800 0e18acfbb5ec6fc399ce75eaadc247ccc4a5cd05201dc58d28ef9824e3764365.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
0e18acfbb5ec6fc399ce75eaadc247ccc4a5cd05201dc58d28ef9824e3764365.execmd.exedescription pid process target process PID 800 wrote to memory of 1180 800 0e18acfbb5ec6fc399ce75eaadc247ccc4a5cd05201dc58d28ef9824e3764365.exe MediaCenter.exe PID 800 wrote to memory of 1180 800 0e18acfbb5ec6fc399ce75eaadc247ccc4a5cd05201dc58d28ef9824e3764365.exe MediaCenter.exe PID 800 wrote to memory of 1180 800 0e18acfbb5ec6fc399ce75eaadc247ccc4a5cd05201dc58d28ef9824e3764365.exe MediaCenter.exe PID 800 wrote to memory of 1180 800 0e18acfbb5ec6fc399ce75eaadc247ccc4a5cd05201dc58d28ef9824e3764365.exe MediaCenter.exe PID 800 wrote to memory of 988 800 0e18acfbb5ec6fc399ce75eaadc247ccc4a5cd05201dc58d28ef9824e3764365.exe cmd.exe PID 800 wrote to memory of 988 800 0e18acfbb5ec6fc399ce75eaadc247ccc4a5cd05201dc58d28ef9824e3764365.exe cmd.exe PID 800 wrote to memory of 988 800 0e18acfbb5ec6fc399ce75eaadc247ccc4a5cd05201dc58d28ef9824e3764365.exe cmd.exe PID 800 wrote to memory of 988 800 0e18acfbb5ec6fc399ce75eaadc247ccc4a5cd05201dc58d28ef9824e3764365.exe cmd.exe PID 988 wrote to memory of 1480 988 cmd.exe PING.EXE PID 988 wrote to memory of 1480 988 cmd.exe PING.EXE PID 988 wrote to memory of 1480 988 cmd.exe PING.EXE PID 988 wrote to memory of 1480 988 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e18acfbb5ec6fc399ce75eaadc247ccc4a5cd05201dc58d28ef9824e3764365.exe"C:\Users\Admin\AppData\Local\Temp\0e18acfbb5ec6fc399ce75eaadc247ccc4a5cd05201dc58d28ef9824e3764365.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:1180 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\0e18acfbb5ec6fc399ce75eaadc247ccc4a5cd05201dc58d28ef9824e3764365.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1480
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
c6fd867d5dab0b3b92f6fd255a990545
SHA17e8247d72a512a69d749bca75a29d36a317bc291
SHA256ea4bdde6cdbbdefcb41f28154d3b0d10ceca8f2160cdd7bb8f91620274be5e83
SHA51259561aacac7648ca819c7afba8aba9f35893c680c5596b446c48fd18722be56ba80fc6caa9934f304c54045aef0fe3f9702b7a60e6384dcf4a3a72444c9a7323
-
MD5
c6fd867d5dab0b3b92f6fd255a990545
SHA17e8247d72a512a69d749bca75a29d36a317bc291
SHA256ea4bdde6cdbbdefcb41f28154d3b0d10ceca8f2160cdd7bb8f91620274be5e83
SHA51259561aacac7648ca819c7afba8aba9f35893c680c5596b446c48fd18722be56ba80fc6caa9934f304c54045aef0fe3f9702b7a60e6384dcf4a3a72444c9a7323
-
MD5
c6fd867d5dab0b3b92f6fd255a990545
SHA17e8247d72a512a69d749bca75a29d36a317bc291
SHA256ea4bdde6cdbbdefcb41f28154d3b0d10ceca8f2160cdd7bb8f91620274be5e83
SHA51259561aacac7648ca819c7afba8aba9f35893c680c5596b446c48fd18722be56ba80fc6caa9934f304c54045aef0fe3f9702b7a60e6384dcf4a3a72444c9a7323