Analysis
-
max time kernel
127s -
max time network
150s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
12-02-2022 12:51
Static task
static1
Behavioral task
behavioral1
Sample
0024573f83caefbe0444b576f8334d964fb5dbd703b71db6a0e35e0f7225e88a.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
0024573f83caefbe0444b576f8334d964fb5dbd703b71db6a0e35e0f7225e88a.exe
Resource
win10v2004-en-20220113
General
-
Target
0024573f83caefbe0444b576f8334d964fb5dbd703b71db6a0e35e0f7225e88a.exe
-
Size
60KB
-
MD5
799680cb66fed5e6e0f4009ed357d1c1
-
SHA1
a2ec49c978ef84d1fea04be53c9e1d2742c3a75c
-
SHA256
0024573f83caefbe0444b576f8334d964fb5dbd703b71db6a0e35e0f7225e88a
-
SHA512
40f818259a919fd9acd8129355f4f098c6c66497e70a0dfeb68403b55df9dc5d6e55dffe700b14e44b8ea81981722b04bae00dae814e015d8d656d56f9d5f530
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 1648 MediaCenter.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1828 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
0024573f83caefbe0444b576f8334d964fb5dbd703b71db6a0e35e0f7225e88a.exepid process 744 0024573f83caefbe0444b576f8334d964fb5dbd703b71db6a0e35e0f7225e88a.exe 744 0024573f83caefbe0444b576f8334d964fb5dbd703b71db6a0e35e0f7225e88a.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
0024573f83caefbe0444b576f8334d964fb5dbd703b71db6a0e35e0f7225e88a.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 0024573f83caefbe0444b576f8334d964fb5dbd703b71db6a0e35e0f7225e88a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
0024573f83caefbe0444b576f8334d964fb5dbd703b71db6a0e35e0f7225e88a.exedescription pid process Token: SeIncBasePriorityPrivilege 744 0024573f83caefbe0444b576f8334d964fb5dbd703b71db6a0e35e0f7225e88a.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
0024573f83caefbe0444b576f8334d964fb5dbd703b71db6a0e35e0f7225e88a.execmd.exedescription pid process target process PID 744 wrote to memory of 1648 744 0024573f83caefbe0444b576f8334d964fb5dbd703b71db6a0e35e0f7225e88a.exe MediaCenter.exe PID 744 wrote to memory of 1648 744 0024573f83caefbe0444b576f8334d964fb5dbd703b71db6a0e35e0f7225e88a.exe MediaCenter.exe PID 744 wrote to memory of 1648 744 0024573f83caefbe0444b576f8334d964fb5dbd703b71db6a0e35e0f7225e88a.exe MediaCenter.exe PID 744 wrote to memory of 1648 744 0024573f83caefbe0444b576f8334d964fb5dbd703b71db6a0e35e0f7225e88a.exe MediaCenter.exe PID 744 wrote to memory of 1828 744 0024573f83caefbe0444b576f8334d964fb5dbd703b71db6a0e35e0f7225e88a.exe cmd.exe PID 744 wrote to memory of 1828 744 0024573f83caefbe0444b576f8334d964fb5dbd703b71db6a0e35e0f7225e88a.exe cmd.exe PID 744 wrote to memory of 1828 744 0024573f83caefbe0444b576f8334d964fb5dbd703b71db6a0e35e0f7225e88a.exe cmd.exe PID 744 wrote to memory of 1828 744 0024573f83caefbe0444b576f8334d964fb5dbd703b71db6a0e35e0f7225e88a.exe cmd.exe PID 1828 wrote to memory of 1884 1828 cmd.exe PING.EXE PID 1828 wrote to memory of 1884 1828 cmd.exe PING.EXE PID 1828 wrote to memory of 1884 1828 cmd.exe PING.EXE PID 1828 wrote to memory of 1884 1828 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\0024573f83caefbe0444b576f8334d964fb5dbd703b71db6a0e35e0f7225e88a.exe"C:\Users\Admin\AppData\Local\Temp\0024573f83caefbe0444b576f8334d964fb5dbd703b71db6a0e35e0f7225e88a.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:1648
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\0024573f83caefbe0444b576f8334d964fb5dbd703b71db6a0e35e0f7225e88a.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1884
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
001e58301d9770e2a203de5c2049dc59
SHA1e24258df5adb4c761f23a2bb39538ffe6d149fc0
SHA256f32d27d63e40e28bc96f6f60cc574bae425623f074823cefef9bb134062422ce
SHA512a2cc8b06ced76f1c8ec95091c9de90f19a66263dcc129d7bded21a139935fcf27bb266d7ccdc7fede82d459010977d8e1ec018dca4dcade7fb710e634af2aabf
-
MD5
001e58301d9770e2a203de5c2049dc59
SHA1e24258df5adb4c761f23a2bb39538ffe6d149fc0
SHA256f32d27d63e40e28bc96f6f60cc574bae425623f074823cefef9bb134062422ce
SHA512a2cc8b06ced76f1c8ec95091c9de90f19a66263dcc129d7bded21a139935fcf27bb266d7ccdc7fede82d459010977d8e1ec018dca4dcade7fb710e634af2aabf
-
MD5
001e58301d9770e2a203de5c2049dc59
SHA1e24258df5adb4c761f23a2bb39538ffe6d149fc0
SHA256f32d27d63e40e28bc96f6f60cc574bae425623f074823cefef9bb134062422ce
SHA512a2cc8b06ced76f1c8ec95091c9de90f19a66263dcc129d7bded21a139935fcf27bb266d7ccdc7fede82d459010977d8e1ec018dca4dcade7fb710e634af2aabf