Analysis
-
max time kernel
137s -
max time network
171s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
12-02-2022 08:22
Static task
static1
Behavioral task
behavioral1
Sample
0b3a6a5d2a52ccf5f1c92552af55435ec4f0089cbe4c0194b4a3b2ffd1b424e3.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
0b3a6a5d2a52ccf5f1c92552af55435ec4f0089cbe4c0194b4a3b2ffd1b424e3.exe
Resource
win10v2004-en-20220113
General
-
Target
0b3a6a5d2a52ccf5f1c92552af55435ec4f0089cbe4c0194b4a3b2ffd1b424e3.exe
-
Size
35KB
-
MD5
678b15804daf5eeef6cd22dbd06b4b32
-
SHA1
6880cbbf81a5e4752d9e8eacb12eb2d96158babd
-
SHA256
0b3a6a5d2a52ccf5f1c92552af55435ec4f0089cbe4c0194b4a3b2ffd1b424e3
-
SHA512
de3e377b88892f72aee59420ff289fc4ad95204edcc1d8021622ff930b925a029f8a6db01d78176d1a8d8f6154daf822be075b5cef6d808c75db16cb0f2a7d72
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 1288 MediaCenter.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 744 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
0b3a6a5d2a52ccf5f1c92552af55435ec4f0089cbe4c0194b4a3b2ffd1b424e3.exepid process 1464 0b3a6a5d2a52ccf5f1c92552af55435ec4f0089cbe4c0194b4a3b2ffd1b424e3.exe 1464 0b3a6a5d2a52ccf5f1c92552af55435ec4f0089cbe4c0194b4a3b2ffd1b424e3.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
0b3a6a5d2a52ccf5f1c92552af55435ec4f0089cbe4c0194b4a3b2ffd1b424e3.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 0b3a6a5d2a52ccf5f1c92552af55435ec4f0089cbe4c0194b4a3b2ffd1b424e3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
0b3a6a5d2a52ccf5f1c92552af55435ec4f0089cbe4c0194b4a3b2ffd1b424e3.exedescription pid process Token: SeIncBasePriorityPrivilege 1464 0b3a6a5d2a52ccf5f1c92552af55435ec4f0089cbe4c0194b4a3b2ffd1b424e3.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
0b3a6a5d2a52ccf5f1c92552af55435ec4f0089cbe4c0194b4a3b2ffd1b424e3.execmd.exedescription pid process target process PID 1464 wrote to memory of 1288 1464 0b3a6a5d2a52ccf5f1c92552af55435ec4f0089cbe4c0194b4a3b2ffd1b424e3.exe MediaCenter.exe PID 1464 wrote to memory of 1288 1464 0b3a6a5d2a52ccf5f1c92552af55435ec4f0089cbe4c0194b4a3b2ffd1b424e3.exe MediaCenter.exe PID 1464 wrote to memory of 1288 1464 0b3a6a5d2a52ccf5f1c92552af55435ec4f0089cbe4c0194b4a3b2ffd1b424e3.exe MediaCenter.exe PID 1464 wrote to memory of 1288 1464 0b3a6a5d2a52ccf5f1c92552af55435ec4f0089cbe4c0194b4a3b2ffd1b424e3.exe MediaCenter.exe PID 1464 wrote to memory of 744 1464 0b3a6a5d2a52ccf5f1c92552af55435ec4f0089cbe4c0194b4a3b2ffd1b424e3.exe cmd.exe PID 1464 wrote to memory of 744 1464 0b3a6a5d2a52ccf5f1c92552af55435ec4f0089cbe4c0194b4a3b2ffd1b424e3.exe cmd.exe PID 1464 wrote to memory of 744 1464 0b3a6a5d2a52ccf5f1c92552af55435ec4f0089cbe4c0194b4a3b2ffd1b424e3.exe cmd.exe PID 1464 wrote to memory of 744 1464 0b3a6a5d2a52ccf5f1c92552af55435ec4f0089cbe4c0194b4a3b2ffd1b424e3.exe cmd.exe PID 744 wrote to memory of 908 744 cmd.exe PING.EXE PID 744 wrote to memory of 908 744 cmd.exe PING.EXE PID 744 wrote to memory of 908 744 cmd.exe PING.EXE PID 744 wrote to memory of 908 744 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b3a6a5d2a52ccf5f1c92552af55435ec4f0089cbe4c0194b4a3b2ffd1b424e3.exe"C:\Users\Admin\AppData\Local\Temp\0b3a6a5d2a52ccf5f1c92552af55435ec4f0089cbe4c0194b4a3b2ffd1b424e3.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:1288 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\0b3a6a5d2a52ccf5f1c92552af55435ec4f0089cbe4c0194b4a3b2ffd1b424e3.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:908
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeMD5
5d69a82e0aaa4f3e4733d21db1d5b145
SHA1a893d729d1f6f088d3bde0f5bfb7407d648cb2fe
SHA2568ecf0be3d99efa739f65602abebbc23ecb55415c0a9c33104833f81bfeff39e0
SHA5127c2a5baca520e1cc39910cacdf1c775b12403a4cca6173b7cfd4385d5418e5ed9225d7a99b5277b1ba4d9b45acf8e71d3eba22d987f36bc910b0adb6c9798fea
-
\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeMD5
5d69a82e0aaa4f3e4733d21db1d5b145
SHA1a893d729d1f6f088d3bde0f5bfb7407d648cb2fe
SHA2568ecf0be3d99efa739f65602abebbc23ecb55415c0a9c33104833f81bfeff39e0
SHA5127c2a5baca520e1cc39910cacdf1c775b12403a4cca6173b7cfd4385d5418e5ed9225d7a99b5277b1ba4d9b45acf8e71d3eba22d987f36bc910b0adb6c9798fea
-
\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeMD5
5d69a82e0aaa4f3e4733d21db1d5b145
SHA1a893d729d1f6f088d3bde0f5bfb7407d648cb2fe
SHA2568ecf0be3d99efa739f65602abebbc23ecb55415c0a9c33104833f81bfeff39e0
SHA5127c2a5baca520e1cc39910cacdf1c775b12403a4cca6173b7cfd4385d5418e5ed9225d7a99b5277b1ba4d9b45acf8e71d3eba22d987f36bc910b0adb6c9798fea
-
memory/1464-55-0x0000000075F81000-0x0000000075F83000-memory.dmpFilesize
8KB