Analysis
-
max time kernel
120s -
max time network
137s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
12-02-2022 12:18
Static task
static1
Behavioral task
behavioral1
Sample
01ef79efa28d698780d7329ccb76da2b2c270f25b8d6bc0150c646d272191f94.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
01ef79efa28d698780d7329ccb76da2b2c270f25b8d6bc0150c646d272191f94.exe
Resource
win10v2004-en-20220113
General
-
Target
01ef79efa28d698780d7329ccb76da2b2c270f25b8d6bc0150c646d272191f94.exe
-
Size
60KB
-
MD5
d634b3ab73e8556b8679b114d455dab0
-
SHA1
e3a165c31727684f54b3fd0869def2f2f32e5f1e
-
SHA256
01ef79efa28d698780d7329ccb76da2b2c270f25b8d6bc0150c646d272191f94
-
SHA512
df807fd2d257258ef25bd83fa5616781ec33ada02a76075c427af6911649f389500aa1f810550b54237c22917bb744951dc0951da675583a987d3cae555cc955
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 836 MediaCenter.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 916 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
01ef79efa28d698780d7329ccb76da2b2c270f25b8d6bc0150c646d272191f94.exepid process 1624 01ef79efa28d698780d7329ccb76da2b2c270f25b8d6bc0150c646d272191f94.exe 1624 01ef79efa28d698780d7329ccb76da2b2c270f25b8d6bc0150c646d272191f94.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
01ef79efa28d698780d7329ccb76da2b2c270f25b8d6bc0150c646d272191f94.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 01ef79efa28d698780d7329ccb76da2b2c270f25b8d6bc0150c646d272191f94.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
01ef79efa28d698780d7329ccb76da2b2c270f25b8d6bc0150c646d272191f94.exedescription pid process Token: SeIncBasePriorityPrivilege 1624 01ef79efa28d698780d7329ccb76da2b2c270f25b8d6bc0150c646d272191f94.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
01ef79efa28d698780d7329ccb76da2b2c270f25b8d6bc0150c646d272191f94.execmd.exedescription pid process target process PID 1624 wrote to memory of 836 1624 01ef79efa28d698780d7329ccb76da2b2c270f25b8d6bc0150c646d272191f94.exe MediaCenter.exe PID 1624 wrote to memory of 836 1624 01ef79efa28d698780d7329ccb76da2b2c270f25b8d6bc0150c646d272191f94.exe MediaCenter.exe PID 1624 wrote to memory of 836 1624 01ef79efa28d698780d7329ccb76da2b2c270f25b8d6bc0150c646d272191f94.exe MediaCenter.exe PID 1624 wrote to memory of 836 1624 01ef79efa28d698780d7329ccb76da2b2c270f25b8d6bc0150c646d272191f94.exe MediaCenter.exe PID 1624 wrote to memory of 916 1624 01ef79efa28d698780d7329ccb76da2b2c270f25b8d6bc0150c646d272191f94.exe cmd.exe PID 1624 wrote to memory of 916 1624 01ef79efa28d698780d7329ccb76da2b2c270f25b8d6bc0150c646d272191f94.exe cmd.exe PID 1624 wrote to memory of 916 1624 01ef79efa28d698780d7329ccb76da2b2c270f25b8d6bc0150c646d272191f94.exe cmd.exe PID 1624 wrote to memory of 916 1624 01ef79efa28d698780d7329ccb76da2b2c270f25b8d6bc0150c646d272191f94.exe cmd.exe PID 916 wrote to memory of 940 916 cmd.exe PING.EXE PID 916 wrote to memory of 940 916 cmd.exe PING.EXE PID 916 wrote to memory of 940 916 cmd.exe PING.EXE PID 916 wrote to memory of 940 916 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\01ef79efa28d698780d7329ccb76da2b2c270f25b8d6bc0150c646d272191f94.exe"C:\Users\Admin\AppData\Local\Temp\01ef79efa28d698780d7329ccb76da2b2c270f25b8d6bc0150c646d272191f94.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:836
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\01ef79efa28d698780d7329ccb76da2b2c270f25b8d6bc0150c646d272191f94.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:940
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
895a6f7cdc7837c2a39ccef535868da5
SHA11ebf411f9af19496bc7c3d006d2b4bb542ed5700
SHA2568082a18fbe3a0c91d5d00d339ee5e35534c7edf11dacb21c219f8231512ea302
SHA5128dcd3743621f856203479d2c206857d3b0f0d6b902320c6a5f5704b9e8e5c0781d7eef11e71a63bbf1687a2904fb6ddd466f6dc9429be10cfd6b7ddc465cfd12
-
MD5
895a6f7cdc7837c2a39ccef535868da5
SHA11ebf411f9af19496bc7c3d006d2b4bb542ed5700
SHA2568082a18fbe3a0c91d5d00d339ee5e35534c7edf11dacb21c219f8231512ea302
SHA5128dcd3743621f856203479d2c206857d3b0f0d6b902320c6a5f5704b9e8e5c0781d7eef11e71a63bbf1687a2904fb6ddd466f6dc9429be10cfd6b7ddc465cfd12
-
MD5
895a6f7cdc7837c2a39ccef535868da5
SHA11ebf411f9af19496bc7c3d006d2b4bb542ed5700
SHA2568082a18fbe3a0c91d5d00d339ee5e35534c7edf11dacb21c219f8231512ea302
SHA5128dcd3743621f856203479d2c206857d3b0f0d6b902320c6a5f5704b9e8e5c0781d7eef11e71a63bbf1687a2904fb6ddd466f6dc9429be10cfd6b7ddc465cfd12