Analysis
-
max time kernel
139s -
max time network
163s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
12-02-2022 07:16
Static task
static1
Behavioral task
behavioral1
Sample
0e18112d15ddcbdf11c9e0c06e6b4e6d5613c84b38f767702c794841c1a37852.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
0e18112d15ddcbdf11c9e0c06e6b4e6d5613c84b38f767702c794841c1a37852.exe
Resource
win10v2004-en-20220113
General
-
Target
0e18112d15ddcbdf11c9e0c06e6b4e6d5613c84b38f767702c794841c1a37852.exe
-
Size
60KB
-
MD5
f30aca1d2b86739088e4f9bb999912d5
-
SHA1
723503036b69e20a91c79f87369e9541c33cddfc
-
SHA256
0e18112d15ddcbdf11c9e0c06e6b4e6d5613c84b38f767702c794841c1a37852
-
SHA512
755613a606ad8821ffe4ab187f651bd5c2cb25a67e8aaf9f42ed9977aa97dd342b407280e8740241b83d326084f086365387b27aabd2fc2f6be32ea1e95add53
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 1712 MediaCenter.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 308 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
0e18112d15ddcbdf11c9e0c06e6b4e6d5613c84b38f767702c794841c1a37852.exepid process 1368 0e18112d15ddcbdf11c9e0c06e6b4e6d5613c84b38f767702c794841c1a37852.exe 1368 0e18112d15ddcbdf11c9e0c06e6b4e6d5613c84b38f767702c794841c1a37852.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
0e18112d15ddcbdf11c9e0c06e6b4e6d5613c84b38f767702c794841c1a37852.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 0e18112d15ddcbdf11c9e0c06e6b4e6d5613c84b38f767702c794841c1a37852.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
0e18112d15ddcbdf11c9e0c06e6b4e6d5613c84b38f767702c794841c1a37852.exedescription pid process Token: SeIncBasePriorityPrivilege 1368 0e18112d15ddcbdf11c9e0c06e6b4e6d5613c84b38f767702c794841c1a37852.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
0e18112d15ddcbdf11c9e0c06e6b4e6d5613c84b38f767702c794841c1a37852.execmd.exedescription pid process target process PID 1368 wrote to memory of 1712 1368 0e18112d15ddcbdf11c9e0c06e6b4e6d5613c84b38f767702c794841c1a37852.exe MediaCenter.exe PID 1368 wrote to memory of 1712 1368 0e18112d15ddcbdf11c9e0c06e6b4e6d5613c84b38f767702c794841c1a37852.exe MediaCenter.exe PID 1368 wrote to memory of 1712 1368 0e18112d15ddcbdf11c9e0c06e6b4e6d5613c84b38f767702c794841c1a37852.exe MediaCenter.exe PID 1368 wrote to memory of 1712 1368 0e18112d15ddcbdf11c9e0c06e6b4e6d5613c84b38f767702c794841c1a37852.exe MediaCenter.exe PID 1368 wrote to memory of 308 1368 0e18112d15ddcbdf11c9e0c06e6b4e6d5613c84b38f767702c794841c1a37852.exe cmd.exe PID 1368 wrote to memory of 308 1368 0e18112d15ddcbdf11c9e0c06e6b4e6d5613c84b38f767702c794841c1a37852.exe cmd.exe PID 1368 wrote to memory of 308 1368 0e18112d15ddcbdf11c9e0c06e6b4e6d5613c84b38f767702c794841c1a37852.exe cmd.exe PID 1368 wrote to memory of 308 1368 0e18112d15ddcbdf11c9e0c06e6b4e6d5613c84b38f767702c794841c1a37852.exe cmd.exe PID 308 wrote to memory of 1060 308 cmd.exe PING.EXE PID 308 wrote to memory of 1060 308 cmd.exe PING.EXE PID 308 wrote to memory of 1060 308 cmd.exe PING.EXE PID 308 wrote to memory of 1060 308 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e18112d15ddcbdf11c9e0c06e6b4e6d5613c84b38f767702c794841c1a37852.exe"C:\Users\Admin\AppData\Local\Temp\0e18112d15ddcbdf11c9e0c06e6b4e6d5613c84b38f767702c794841c1a37852.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:1712 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\0e18112d15ddcbdf11c9e0c06e6b4e6d5613c84b38f767702c794841c1a37852.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:308 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1060
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
ae0f924e459bcb0884fec0ca73202bad
SHA181106f648b65b530661288593faf949f22d24cda
SHA256b60a085046f12236364981df83871fff80aa4b48d22f5dfcb67e91f374a07bdc
SHA512d6b773b96134b8c5b4e151c396fa419f9c287255385cc6452f8d092da11b07d6a6d93c03c9f6a4471b8c0a9156361caa253694cd9c01b22a5c58a11c249c7a6d
-
MD5
ae0f924e459bcb0884fec0ca73202bad
SHA181106f648b65b530661288593faf949f22d24cda
SHA256b60a085046f12236364981df83871fff80aa4b48d22f5dfcb67e91f374a07bdc
SHA512d6b773b96134b8c5b4e151c396fa419f9c287255385cc6452f8d092da11b07d6a6d93c03c9f6a4471b8c0a9156361caa253694cd9c01b22a5c58a11c249c7a6d
-
MD5
ae0f924e459bcb0884fec0ca73202bad
SHA181106f648b65b530661288593faf949f22d24cda
SHA256b60a085046f12236364981df83871fff80aa4b48d22f5dfcb67e91f374a07bdc
SHA512d6b773b96134b8c5b4e151c396fa419f9c287255385cc6452f8d092da11b07d6a6d93c03c9f6a4471b8c0a9156361caa253694cd9c01b22a5c58a11c249c7a6d