Analysis
-
max time kernel
142s -
max time network
172s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
12-02-2022 12:00
Static task
static1
Behavioral task
behavioral1
Sample
02c0a22decd64cc5966e712f6544f53af6e98a5880737666a5e98be6b4a3f771.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
02c0a22decd64cc5966e712f6544f53af6e98a5880737666a5e98be6b4a3f771.exe
Resource
win10v2004-en-20220112
General
-
Target
02c0a22decd64cc5966e712f6544f53af6e98a5880737666a5e98be6b4a3f771.exe
-
Size
36KB
-
MD5
67f48baafc0626f6a204ad79a4483b61
-
SHA1
d5d094d3d6d3c23da23bb958e81ed54e90095034
-
SHA256
02c0a22decd64cc5966e712f6544f53af6e98a5880737666a5e98be6b4a3f771
-
SHA512
d90c4ea77787ee97545af333635a192d67144fa8c31efc87d3df546079febb36ada7bb08f5e267c3ba88add499bd2915458f2ab825f5ab63d30e44e181573634
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 1636 MediaCenter.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 968 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
02c0a22decd64cc5966e712f6544f53af6e98a5880737666a5e98be6b4a3f771.exepid process 784 02c0a22decd64cc5966e712f6544f53af6e98a5880737666a5e98be6b4a3f771.exe 784 02c0a22decd64cc5966e712f6544f53af6e98a5880737666a5e98be6b4a3f771.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
02c0a22decd64cc5966e712f6544f53af6e98a5880737666a5e98be6b4a3f771.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 02c0a22decd64cc5966e712f6544f53af6e98a5880737666a5e98be6b4a3f771.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
02c0a22decd64cc5966e712f6544f53af6e98a5880737666a5e98be6b4a3f771.exedescription pid process Token: SeIncBasePriorityPrivilege 784 02c0a22decd64cc5966e712f6544f53af6e98a5880737666a5e98be6b4a3f771.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
02c0a22decd64cc5966e712f6544f53af6e98a5880737666a5e98be6b4a3f771.execmd.exedescription pid process target process PID 784 wrote to memory of 1636 784 02c0a22decd64cc5966e712f6544f53af6e98a5880737666a5e98be6b4a3f771.exe MediaCenter.exe PID 784 wrote to memory of 1636 784 02c0a22decd64cc5966e712f6544f53af6e98a5880737666a5e98be6b4a3f771.exe MediaCenter.exe PID 784 wrote to memory of 1636 784 02c0a22decd64cc5966e712f6544f53af6e98a5880737666a5e98be6b4a3f771.exe MediaCenter.exe PID 784 wrote to memory of 1636 784 02c0a22decd64cc5966e712f6544f53af6e98a5880737666a5e98be6b4a3f771.exe MediaCenter.exe PID 784 wrote to memory of 968 784 02c0a22decd64cc5966e712f6544f53af6e98a5880737666a5e98be6b4a3f771.exe cmd.exe PID 784 wrote to memory of 968 784 02c0a22decd64cc5966e712f6544f53af6e98a5880737666a5e98be6b4a3f771.exe cmd.exe PID 784 wrote to memory of 968 784 02c0a22decd64cc5966e712f6544f53af6e98a5880737666a5e98be6b4a3f771.exe cmd.exe PID 784 wrote to memory of 968 784 02c0a22decd64cc5966e712f6544f53af6e98a5880737666a5e98be6b4a3f771.exe cmd.exe PID 968 wrote to memory of 1484 968 cmd.exe PING.EXE PID 968 wrote to memory of 1484 968 cmd.exe PING.EXE PID 968 wrote to memory of 1484 968 cmd.exe PING.EXE PID 968 wrote to memory of 1484 968 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\02c0a22decd64cc5966e712f6544f53af6e98a5880737666a5e98be6b4a3f771.exe"C:\Users\Admin\AppData\Local\Temp\02c0a22decd64cc5966e712f6544f53af6e98a5880737666a5e98be6b4a3f771.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:1636 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\02c0a22decd64cc5966e712f6544f53af6e98a5880737666a5e98be6b4a3f771.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1484
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeMD5
9d6ca1be990c8d427d50588def940ea5
SHA1c2f7c767e1236428bda375006f6f7c9cba0f2b34
SHA256447cc75992e072c25b19d54188cb540b835bda7be51581977289c4c4e56999b0
SHA512abfb2d3cc9da0c35c97f7630166ac93d0af01ab64e9806d9f80b606ee1515670590c0b2321df25a6f2bd973257e6e9dbc094be04318861455d9693f9b3dab52b
-
\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeMD5
9d6ca1be990c8d427d50588def940ea5
SHA1c2f7c767e1236428bda375006f6f7c9cba0f2b34
SHA256447cc75992e072c25b19d54188cb540b835bda7be51581977289c4c4e56999b0
SHA512abfb2d3cc9da0c35c97f7630166ac93d0af01ab64e9806d9f80b606ee1515670590c0b2321df25a6f2bd973257e6e9dbc094be04318861455d9693f9b3dab52b
-
\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeMD5
9d6ca1be990c8d427d50588def940ea5
SHA1c2f7c767e1236428bda375006f6f7c9cba0f2b34
SHA256447cc75992e072c25b19d54188cb540b835bda7be51581977289c4c4e56999b0
SHA512abfb2d3cc9da0c35c97f7630166ac93d0af01ab64e9806d9f80b606ee1515670590c0b2321df25a6f2bd973257e6e9dbc094be04318861455d9693f9b3dab52b
-
memory/784-55-0x0000000076921000-0x0000000076923000-memory.dmpFilesize
8KB