Analysis
-
max time kernel
157s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
12-02-2022 10:33
Static task
static1
Behavioral task
behavioral1
Sample
06cfcfa7a67c90f2a219e7b02ec3d10ec6ef00944da734a55c757c9520e84618.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
06cfcfa7a67c90f2a219e7b02ec3d10ec6ef00944da734a55c757c9520e84618.exe
Resource
win10v2004-en-20220112
General
-
Target
06cfcfa7a67c90f2a219e7b02ec3d10ec6ef00944da734a55c757c9520e84618.exe
-
Size
35KB
-
MD5
1aa1c5811584f9590e461f67b0cd441f
-
SHA1
22acba0dd05f249df9e8d36f3ba799dc3fb8991b
-
SHA256
06cfcfa7a67c90f2a219e7b02ec3d10ec6ef00944da734a55c757c9520e84618
-
SHA512
d3fa5abda191d6d6ed2d01bc95429026957ed1d3d9c475ea9d05fccffd1e08f64b8ab9b8f2cfab2779e4834cecc61e2c784ae70799831ea02c4b5c5e394979f1
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 3900 MediaCenter.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
06cfcfa7a67c90f2a219e7b02ec3d10ec6ef00944da734a55c757c9520e84618.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation 06cfcfa7a67c90f2a219e7b02ec3d10ec6ef00944da734a55c757c9520e84618.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
06cfcfa7a67c90f2a219e7b02ec3d10ec6ef00944da734a55c757c9520e84618.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 06cfcfa7a67c90f2a219e7b02ec3d10ec6ef00944da734a55c757c9520e84618.exe -
Drops file in Windows directory 3 IoCs
Processes:
svchost.exeTiWorker.exedescription ioc process File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\DeliveryOptimization\State\keyValueLKG.dat svchost.exe File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe File opened for modification C:\Windows\WinSxS\pending.xml TiWorker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
MusNotifyIcon.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MusNotifyIcon.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MusNotifyIcon.exe -
Modifies data under HKEY_USERS 50 IoCs
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyLinkLocalBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthID = "2" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CacheSizeBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\GroupConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UplinkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\BkDownloadRatePct = "45" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadCount = "0" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "4300" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "4284" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "4104" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\Geo_EndpointFullUri = "https://geo.prod.do.dsp.mp.microsoft.com/geo" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\LANConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownlinkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\FrDownloadRatePct = "90" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateFrCnt = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownlinkUsageBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\NormalDownloadCount = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "0.103880" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateFrBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CDNConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\InternetConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PriorityDownloadPendingCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCacheHostBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\KVFileExpirationTime = "132893130552131843" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\GeoVersion_EndpointFullUri = "https://geover.prod.do.dsp.mp.microsoft.com/geoversion" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PeerInfoCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PriorityDownloadCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\SwarmCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\DODownloadMode = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadMonthlyLanBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCdnBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\LinkLocalConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UplinkUsageBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadRatePct = "100" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthlyUploadRestriction = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "3.903539" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\DownloadMode_BackCompat = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadMonthlyInternetBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyInternetBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyLanBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkCnt = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\SwarmCount = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\NormalDownloadPendingCount = "0" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Settings svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyGroupBytes = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "0.000000" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage svchost.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
06cfcfa7a67c90f2a219e7b02ec3d10ec6ef00944da734a55c757c9520e84618.exeTiWorker.exedescription pid process Token: SeIncBasePriorityPrivilege 616 06cfcfa7a67c90f2a219e7b02ec3d10ec6ef00944da734a55c757c9520e84618.exe Token: SeSecurityPrivilege 2272 TiWorker.exe Token: SeRestorePrivilege 2272 TiWorker.exe Token: SeBackupPrivilege 2272 TiWorker.exe Token: SeBackupPrivilege 2272 TiWorker.exe Token: SeRestorePrivilege 2272 TiWorker.exe Token: SeSecurityPrivilege 2272 TiWorker.exe Token: SeBackupPrivilege 2272 TiWorker.exe Token: SeRestorePrivilege 2272 TiWorker.exe Token: SeSecurityPrivilege 2272 TiWorker.exe Token: SeBackupPrivilege 2272 TiWorker.exe Token: SeRestorePrivilege 2272 TiWorker.exe Token: SeSecurityPrivilege 2272 TiWorker.exe Token: SeBackupPrivilege 2272 TiWorker.exe Token: SeRestorePrivilege 2272 TiWorker.exe Token: SeSecurityPrivilege 2272 TiWorker.exe Token: SeBackupPrivilege 2272 TiWorker.exe Token: SeRestorePrivilege 2272 TiWorker.exe Token: SeSecurityPrivilege 2272 TiWorker.exe Token: SeBackupPrivilege 2272 TiWorker.exe Token: SeRestorePrivilege 2272 TiWorker.exe Token: SeSecurityPrivilege 2272 TiWorker.exe Token: SeBackupPrivilege 2272 TiWorker.exe Token: SeRestorePrivilege 2272 TiWorker.exe Token: SeSecurityPrivilege 2272 TiWorker.exe Token: SeBackupPrivilege 2272 TiWorker.exe Token: SeRestorePrivilege 2272 TiWorker.exe Token: SeSecurityPrivilege 2272 TiWorker.exe Token: SeBackupPrivilege 2272 TiWorker.exe Token: SeRestorePrivilege 2272 TiWorker.exe Token: SeSecurityPrivilege 2272 TiWorker.exe Token: SeBackupPrivilege 2272 TiWorker.exe Token: SeRestorePrivilege 2272 TiWorker.exe Token: SeSecurityPrivilege 2272 TiWorker.exe Token: SeBackupPrivilege 2272 TiWorker.exe Token: SeRestorePrivilege 2272 TiWorker.exe Token: SeSecurityPrivilege 2272 TiWorker.exe Token: SeBackupPrivilege 2272 TiWorker.exe Token: SeRestorePrivilege 2272 TiWorker.exe Token: SeSecurityPrivilege 2272 TiWorker.exe Token: SeBackupPrivilege 2272 TiWorker.exe Token: SeRestorePrivilege 2272 TiWorker.exe Token: SeSecurityPrivilege 2272 TiWorker.exe Token: SeBackupPrivilege 2272 TiWorker.exe Token: SeRestorePrivilege 2272 TiWorker.exe Token: SeSecurityPrivilege 2272 TiWorker.exe Token: SeBackupPrivilege 2272 TiWorker.exe Token: SeRestorePrivilege 2272 TiWorker.exe Token: SeSecurityPrivilege 2272 TiWorker.exe Token: SeBackupPrivilege 2272 TiWorker.exe Token: SeRestorePrivilege 2272 TiWorker.exe Token: SeSecurityPrivilege 2272 TiWorker.exe Token: SeBackupPrivilege 2272 TiWorker.exe Token: SeRestorePrivilege 2272 TiWorker.exe Token: SeSecurityPrivilege 2272 TiWorker.exe Token: SeBackupPrivilege 2272 TiWorker.exe Token: SeRestorePrivilege 2272 TiWorker.exe Token: SeSecurityPrivilege 2272 TiWorker.exe Token: SeBackupPrivilege 2272 TiWorker.exe Token: SeRestorePrivilege 2272 TiWorker.exe Token: SeSecurityPrivilege 2272 TiWorker.exe Token: SeBackupPrivilege 2272 TiWorker.exe Token: SeRestorePrivilege 2272 TiWorker.exe Token: SeSecurityPrivilege 2272 TiWorker.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
06cfcfa7a67c90f2a219e7b02ec3d10ec6ef00944da734a55c757c9520e84618.execmd.exedescription pid process target process PID 616 wrote to memory of 3900 616 06cfcfa7a67c90f2a219e7b02ec3d10ec6ef00944da734a55c757c9520e84618.exe MediaCenter.exe PID 616 wrote to memory of 3900 616 06cfcfa7a67c90f2a219e7b02ec3d10ec6ef00944da734a55c757c9520e84618.exe MediaCenter.exe PID 616 wrote to memory of 3900 616 06cfcfa7a67c90f2a219e7b02ec3d10ec6ef00944da734a55c757c9520e84618.exe MediaCenter.exe PID 616 wrote to memory of 900 616 06cfcfa7a67c90f2a219e7b02ec3d10ec6ef00944da734a55c757c9520e84618.exe cmd.exe PID 616 wrote to memory of 900 616 06cfcfa7a67c90f2a219e7b02ec3d10ec6ef00944da734a55c757c9520e84618.exe cmd.exe PID 616 wrote to memory of 900 616 06cfcfa7a67c90f2a219e7b02ec3d10ec6ef00944da734a55c757c9520e84618.exe cmd.exe PID 900 wrote to memory of 3404 900 cmd.exe PING.EXE PID 900 wrote to memory of 3404 900 cmd.exe PING.EXE PID 900 wrote to memory of 3404 900 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\06cfcfa7a67c90f2a219e7b02ec3d10ec6ef00944da734a55c757c9520e84618.exe"C:\Users\Admin\AppData\Local\Temp\06cfcfa7a67c90f2a219e7b02ec3d10ec6ef00944da734a55c757c9520e84618.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:3900 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\06cfcfa7a67c90f2a219e7b02ec3d10ec6ef00944da734a55c757c9520e84618.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:3404
-
C:\Windows\system32\MusNotifyIcon.exe%systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 131⤵
- Checks processor information in registry
PID:3960
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:2756
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2272
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeMD5
c58bf05a131a7af9c40eb4b68c83d049
SHA111bcf65393165c309b6099cf3ce2329325319280
SHA256a2281efd6c2b21ae64e9301003a19d4bd0ea9d569d09549acc32d1db621bdc19
SHA512c2145030b112a5b28b41b7adee3441c907d0a8888ce75d07156e8f7f20cab194a5180e38657df448353ae7eda69aee5a0b2ffd6fc227737f275aa12d2c589afe
-
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeMD5
c58bf05a131a7af9c40eb4b68c83d049
SHA111bcf65393165c309b6099cf3ce2329325319280
SHA256a2281efd6c2b21ae64e9301003a19d4bd0ea9d569d09549acc32d1db621bdc19
SHA512c2145030b112a5b28b41b7adee3441c907d0a8888ce75d07156e8f7f20cab194a5180e38657df448353ae7eda69aee5a0b2ffd6fc227737f275aa12d2c589afe