Analysis
-
max time kernel
129s -
max time network
158s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
12-02-2022 06:31
Static task
static1
Behavioral task
behavioral1
Sample
0fc2a093e96c6cd549bc6632415a2a3fcebda8c68ed92802569d74394d2ef3d3.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
0fc2a093e96c6cd549bc6632415a2a3fcebda8c68ed92802569d74394d2ef3d3.exe
Resource
win10v2004-en-20220113
General
-
Target
0fc2a093e96c6cd549bc6632415a2a3fcebda8c68ed92802569d74394d2ef3d3.exe
-
Size
36KB
-
MD5
ee8759ca755faab6b51012963215e80e
-
SHA1
a9e25a7a39be89bfa991c4f509b6e1886c01a591
-
SHA256
0fc2a093e96c6cd549bc6632415a2a3fcebda8c68ed92802569d74394d2ef3d3
-
SHA512
81beb479c20ca559e4596a5afac0ab06899e0ad3cddf7e5164c183676762dc2ca5a40334fb6710a96f07561b8afd48422e1b35983cf90244499783fb5c4815d1
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 1924 MediaCenter.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1600 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
0fc2a093e96c6cd549bc6632415a2a3fcebda8c68ed92802569d74394d2ef3d3.exepid process 1040 0fc2a093e96c6cd549bc6632415a2a3fcebda8c68ed92802569d74394d2ef3d3.exe 1040 0fc2a093e96c6cd549bc6632415a2a3fcebda8c68ed92802569d74394d2ef3d3.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
0fc2a093e96c6cd549bc6632415a2a3fcebda8c68ed92802569d74394d2ef3d3.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 0fc2a093e96c6cd549bc6632415a2a3fcebda8c68ed92802569d74394d2ef3d3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
0fc2a093e96c6cd549bc6632415a2a3fcebda8c68ed92802569d74394d2ef3d3.exedescription pid process Token: SeIncBasePriorityPrivilege 1040 0fc2a093e96c6cd549bc6632415a2a3fcebda8c68ed92802569d74394d2ef3d3.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
0fc2a093e96c6cd549bc6632415a2a3fcebda8c68ed92802569d74394d2ef3d3.execmd.exedescription pid process target process PID 1040 wrote to memory of 1924 1040 0fc2a093e96c6cd549bc6632415a2a3fcebda8c68ed92802569d74394d2ef3d3.exe MediaCenter.exe PID 1040 wrote to memory of 1924 1040 0fc2a093e96c6cd549bc6632415a2a3fcebda8c68ed92802569d74394d2ef3d3.exe MediaCenter.exe PID 1040 wrote to memory of 1924 1040 0fc2a093e96c6cd549bc6632415a2a3fcebda8c68ed92802569d74394d2ef3d3.exe MediaCenter.exe PID 1040 wrote to memory of 1924 1040 0fc2a093e96c6cd549bc6632415a2a3fcebda8c68ed92802569d74394d2ef3d3.exe MediaCenter.exe PID 1040 wrote to memory of 1600 1040 0fc2a093e96c6cd549bc6632415a2a3fcebda8c68ed92802569d74394d2ef3d3.exe cmd.exe PID 1040 wrote to memory of 1600 1040 0fc2a093e96c6cd549bc6632415a2a3fcebda8c68ed92802569d74394d2ef3d3.exe cmd.exe PID 1040 wrote to memory of 1600 1040 0fc2a093e96c6cd549bc6632415a2a3fcebda8c68ed92802569d74394d2ef3d3.exe cmd.exe PID 1040 wrote to memory of 1600 1040 0fc2a093e96c6cd549bc6632415a2a3fcebda8c68ed92802569d74394d2ef3d3.exe cmd.exe PID 1600 wrote to memory of 1836 1600 cmd.exe PING.EXE PID 1600 wrote to memory of 1836 1600 cmd.exe PING.EXE PID 1600 wrote to memory of 1836 1600 cmd.exe PING.EXE PID 1600 wrote to memory of 1836 1600 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\0fc2a093e96c6cd549bc6632415a2a3fcebda8c68ed92802569d74394d2ef3d3.exe"C:\Users\Admin\AppData\Local\Temp\0fc2a093e96c6cd549bc6632415a2a3fcebda8c68ed92802569d74394d2ef3d3.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:1924 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\0fc2a093e96c6cd549bc6632415a2a3fcebda8c68ed92802569d74394d2ef3d3.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1836
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
49a80e4497e98ec14e4e21e39e4a07c0
SHA10acc4aa555f11e82de93fa3bebd15234976a86cd
SHA256b2011e0f82cb8edaa027c0711799e36a51de2c2361f8d09309e9ba14f09576cc
SHA5124c0a4481b887dff53ae54540b2db0eb0d5ac9c40f0105ecb6a6cd31fb714a589b891a06b37a6b0d7a6adf4a8f15bf62727c79502b42d5db279de6f809442fde6
-
MD5
49a80e4497e98ec14e4e21e39e4a07c0
SHA10acc4aa555f11e82de93fa3bebd15234976a86cd
SHA256b2011e0f82cb8edaa027c0711799e36a51de2c2361f8d09309e9ba14f09576cc
SHA5124c0a4481b887dff53ae54540b2db0eb0d5ac9c40f0105ecb6a6cd31fb714a589b891a06b37a6b0d7a6adf4a8f15bf62727c79502b42d5db279de6f809442fde6
-
MD5
49a80e4497e98ec14e4e21e39e4a07c0
SHA10acc4aa555f11e82de93fa3bebd15234976a86cd
SHA256b2011e0f82cb8edaa027c0711799e36a51de2c2361f8d09309e9ba14f09576cc
SHA5124c0a4481b887dff53ae54540b2db0eb0d5ac9c40f0105ecb6a6cd31fb714a589b891a06b37a6b0d7a6adf4a8f15bf62727c79502b42d5db279de6f809442fde6