Analysis
-
max time kernel
121s -
max time network
145s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
12-02-2022 09:21
Static task
static1
Behavioral task
behavioral1
Sample
0a4e5b1b206bb3e5810a393dd50570155f030e831c5ea6a60577c8f236d5cdc4.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
0a4e5b1b206bb3e5810a393dd50570155f030e831c5ea6a60577c8f236d5cdc4.exe
Resource
win10v2004-en-20220113
General
-
Target
0a4e5b1b206bb3e5810a393dd50570155f030e831c5ea6a60577c8f236d5cdc4.exe
-
Size
35KB
-
MD5
9e6d0b0c221a12229d6b591fa5db14cc
-
SHA1
6bf032df9f420191db765723117df57f9125c6ca
-
SHA256
0a4e5b1b206bb3e5810a393dd50570155f030e831c5ea6a60577c8f236d5cdc4
-
SHA512
32a22e9648476dbfd0e77836a874d2d4a1261c26b6032b89d723119419236fb9381cc54a4d7924e6af337149a66ea382f4985a4824b74cc69d494df3672b3e76
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 952 MediaCenter.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 744 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
0a4e5b1b206bb3e5810a393dd50570155f030e831c5ea6a60577c8f236d5cdc4.exepid process 828 0a4e5b1b206bb3e5810a393dd50570155f030e831c5ea6a60577c8f236d5cdc4.exe 828 0a4e5b1b206bb3e5810a393dd50570155f030e831c5ea6a60577c8f236d5cdc4.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
0a4e5b1b206bb3e5810a393dd50570155f030e831c5ea6a60577c8f236d5cdc4.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 0a4e5b1b206bb3e5810a393dd50570155f030e831c5ea6a60577c8f236d5cdc4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
0a4e5b1b206bb3e5810a393dd50570155f030e831c5ea6a60577c8f236d5cdc4.exedescription pid process Token: SeIncBasePriorityPrivilege 828 0a4e5b1b206bb3e5810a393dd50570155f030e831c5ea6a60577c8f236d5cdc4.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
0a4e5b1b206bb3e5810a393dd50570155f030e831c5ea6a60577c8f236d5cdc4.execmd.exedescription pid process target process PID 828 wrote to memory of 952 828 0a4e5b1b206bb3e5810a393dd50570155f030e831c5ea6a60577c8f236d5cdc4.exe MediaCenter.exe PID 828 wrote to memory of 952 828 0a4e5b1b206bb3e5810a393dd50570155f030e831c5ea6a60577c8f236d5cdc4.exe MediaCenter.exe PID 828 wrote to memory of 952 828 0a4e5b1b206bb3e5810a393dd50570155f030e831c5ea6a60577c8f236d5cdc4.exe MediaCenter.exe PID 828 wrote to memory of 952 828 0a4e5b1b206bb3e5810a393dd50570155f030e831c5ea6a60577c8f236d5cdc4.exe MediaCenter.exe PID 828 wrote to memory of 744 828 0a4e5b1b206bb3e5810a393dd50570155f030e831c5ea6a60577c8f236d5cdc4.exe cmd.exe PID 828 wrote to memory of 744 828 0a4e5b1b206bb3e5810a393dd50570155f030e831c5ea6a60577c8f236d5cdc4.exe cmd.exe PID 828 wrote to memory of 744 828 0a4e5b1b206bb3e5810a393dd50570155f030e831c5ea6a60577c8f236d5cdc4.exe cmd.exe PID 828 wrote to memory of 744 828 0a4e5b1b206bb3e5810a393dd50570155f030e831c5ea6a60577c8f236d5cdc4.exe cmd.exe PID 744 wrote to memory of 820 744 cmd.exe PING.EXE PID 744 wrote to memory of 820 744 cmd.exe PING.EXE PID 744 wrote to memory of 820 744 cmd.exe PING.EXE PID 744 wrote to memory of 820 744 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a4e5b1b206bb3e5810a393dd50570155f030e831c5ea6a60577c8f236d5cdc4.exe"C:\Users\Admin\AppData\Local\Temp\0a4e5b1b206bb3e5810a393dd50570155f030e831c5ea6a60577c8f236d5cdc4.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:952 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\0a4e5b1b206bb3e5810a393dd50570155f030e831c5ea6a60577c8f236d5cdc4.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:820
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeMD5
281363f25901f18946710c737ab6f161
SHA1dd3baea7862dff82d049ba8da29885742b3b958a
SHA2567541f6cd861b7485b4c7f7b5f149e6062f309e023efc1690b99822fd2a21ceb4
SHA51249607fb1975f6ce1c2b8b3391da123f88db273bf8f7f93a771062c81663e3c75d768c7872d28f9c4a5df647ac7e7ab9574006e19ccaf2cbb5020b2442b5aeb92
-
\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeMD5
281363f25901f18946710c737ab6f161
SHA1dd3baea7862dff82d049ba8da29885742b3b958a
SHA2567541f6cd861b7485b4c7f7b5f149e6062f309e023efc1690b99822fd2a21ceb4
SHA51249607fb1975f6ce1c2b8b3391da123f88db273bf8f7f93a771062c81663e3c75d768c7872d28f9c4a5df647ac7e7ab9574006e19ccaf2cbb5020b2442b5aeb92
-
\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeMD5
281363f25901f18946710c737ab6f161
SHA1dd3baea7862dff82d049ba8da29885742b3b958a
SHA2567541f6cd861b7485b4c7f7b5f149e6062f309e023efc1690b99822fd2a21ceb4
SHA51249607fb1975f6ce1c2b8b3391da123f88db273bf8f7f93a771062c81663e3c75d768c7872d28f9c4a5df647ac7e7ab9574006e19ccaf2cbb5020b2442b5aeb92
-
memory/828-55-0x0000000075D61000-0x0000000075D63000-memory.dmpFilesize
8KB