Analysis
-
max time kernel
134s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
12-02-2022 12:25
Static task
static1
Behavioral task
behavioral1
Sample
01935820a2e1dd3a82cd13993bf9cac65ae5bbced217fa21fdf132807457c5a4.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
01935820a2e1dd3a82cd13993bf9cac65ae5bbced217fa21fdf132807457c5a4.exe
Resource
win10v2004-en-20220113
General
-
Target
01935820a2e1dd3a82cd13993bf9cac65ae5bbced217fa21fdf132807457c5a4.exe
-
Size
58KB
-
MD5
7c32d803a077d7f87953a62a736efec1
-
SHA1
541685e0453480eed4bf4294c434c6836147d588
-
SHA256
01935820a2e1dd3a82cd13993bf9cac65ae5bbced217fa21fdf132807457c5a4
-
SHA512
68e401a013894c08bc8b4dadaff62248a237f08cca1cd1e4d22bec982e3b3bfb93d5352ad05fa67dbb81be393b1b39d76e6332ef223a8e50bb46a1f6752043bf
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 1572 MediaCenter.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
01935820a2e1dd3a82cd13993bf9cac65ae5bbced217fa21fdf132807457c5a4.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 01935820a2e1dd3a82cd13993bf9cac65ae5bbced217fa21fdf132807457c5a4.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
01935820a2e1dd3a82cd13993bf9cac65ae5bbced217fa21fdf132807457c5a4.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 01935820a2e1dd3a82cd13993bf9cac65ae5bbced217fa21fdf132807457c5a4.exe -
Drops file in Windows directory 8 IoCs
Processes:
svchost.exeTiWorker.exedescription ioc process File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe File opened for modification C:\Windows\WinSxS\pending.xml TiWorker.exe File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
svchost.exe01935820a2e1dd3a82cd13993bf9cac65ae5bbced217fa21fdf132807457c5a4.exeTiWorker.exedescription pid process Token: SeShutdownPrivilege 2656 svchost.exe Token: SeCreatePagefilePrivilege 2656 svchost.exe Token: SeShutdownPrivilege 2656 svchost.exe Token: SeCreatePagefilePrivilege 2656 svchost.exe Token: SeShutdownPrivilege 2656 svchost.exe Token: SeCreatePagefilePrivilege 2656 svchost.exe Token: SeIncBasePriorityPrivilege 3568 01935820a2e1dd3a82cd13993bf9cac65ae5bbced217fa21fdf132807457c5a4.exe Token: SeSecurityPrivilege 4692 TiWorker.exe Token: SeRestorePrivilege 4692 TiWorker.exe Token: SeBackupPrivilege 4692 TiWorker.exe Token: SeBackupPrivilege 4692 TiWorker.exe Token: SeRestorePrivilege 4692 TiWorker.exe Token: SeSecurityPrivilege 4692 TiWorker.exe Token: SeBackupPrivilege 4692 TiWorker.exe Token: SeRestorePrivilege 4692 TiWorker.exe Token: SeSecurityPrivilege 4692 TiWorker.exe Token: SeBackupPrivilege 4692 TiWorker.exe Token: SeRestorePrivilege 4692 TiWorker.exe Token: SeSecurityPrivilege 4692 TiWorker.exe Token: SeBackupPrivilege 4692 TiWorker.exe Token: SeRestorePrivilege 4692 TiWorker.exe Token: SeSecurityPrivilege 4692 TiWorker.exe Token: SeBackupPrivilege 4692 TiWorker.exe Token: SeRestorePrivilege 4692 TiWorker.exe Token: SeSecurityPrivilege 4692 TiWorker.exe Token: SeBackupPrivilege 4692 TiWorker.exe Token: SeRestorePrivilege 4692 TiWorker.exe Token: SeSecurityPrivilege 4692 TiWorker.exe Token: SeBackupPrivilege 4692 TiWorker.exe Token: SeRestorePrivilege 4692 TiWorker.exe Token: SeSecurityPrivilege 4692 TiWorker.exe Token: SeBackupPrivilege 4692 TiWorker.exe Token: SeRestorePrivilege 4692 TiWorker.exe Token: SeSecurityPrivilege 4692 TiWorker.exe Token: SeBackupPrivilege 4692 TiWorker.exe Token: SeRestorePrivilege 4692 TiWorker.exe Token: SeSecurityPrivilege 4692 TiWorker.exe Token: SeBackupPrivilege 4692 TiWorker.exe Token: SeRestorePrivilege 4692 TiWorker.exe Token: SeSecurityPrivilege 4692 TiWorker.exe Token: SeBackupPrivilege 4692 TiWorker.exe Token: SeRestorePrivilege 4692 TiWorker.exe Token: SeSecurityPrivilege 4692 TiWorker.exe Token: SeBackupPrivilege 4692 TiWorker.exe Token: SeRestorePrivilege 4692 TiWorker.exe Token: SeSecurityPrivilege 4692 TiWorker.exe Token: SeBackupPrivilege 4692 TiWorker.exe Token: SeRestorePrivilege 4692 TiWorker.exe Token: SeSecurityPrivilege 4692 TiWorker.exe Token: SeBackupPrivilege 4692 TiWorker.exe Token: SeRestorePrivilege 4692 TiWorker.exe Token: SeSecurityPrivilege 4692 TiWorker.exe Token: SeBackupPrivilege 4692 TiWorker.exe Token: SeRestorePrivilege 4692 TiWorker.exe Token: SeSecurityPrivilege 4692 TiWorker.exe Token: SeBackupPrivilege 4692 TiWorker.exe Token: SeRestorePrivilege 4692 TiWorker.exe Token: SeSecurityPrivilege 4692 TiWorker.exe Token: SeBackupPrivilege 4692 TiWorker.exe Token: SeRestorePrivilege 4692 TiWorker.exe Token: SeSecurityPrivilege 4692 TiWorker.exe Token: SeBackupPrivilege 4692 TiWorker.exe Token: SeRestorePrivilege 4692 TiWorker.exe Token: SeSecurityPrivilege 4692 TiWorker.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
01935820a2e1dd3a82cd13993bf9cac65ae5bbced217fa21fdf132807457c5a4.execmd.exedescription pid process target process PID 3568 wrote to memory of 1572 3568 01935820a2e1dd3a82cd13993bf9cac65ae5bbced217fa21fdf132807457c5a4.exe MediaCenter.exe PID 3568 wrote to memory of 1572 3568 01935820a2e1dd3a82cd13993bf9cac65ae5bbced217fa21fdf132807457c5a4.exe MediaCenter.exe PID 3568 wrote to memory of 1572 3568 01935820a2e1dd3a82cd13993bf9cac65ae5bbced217fa21fdf132807457c5a4.exe MediaCenter.exe PID 3568 wrote to memory of 4588 3568 01935820a2e1dd3a82cd13993bf9cac65ae5bbced217fa21fdf132807457c5a4.exe cmd.exe PID 3568 wrote to memory of 4588 3568 01935820a2e1dd3a82cd13993bf9cac65ae5bbced217fa21fdf132807457c5a4.exe cmd.exe PID 3568 wrote to memory of 4588 3568 01935820a2e1dd3a82cd13993bf9cac65ae5bbced217fa21fdf132807457c5a4.exe cmd.exe PID 4588 wrote to memory of 4636 4588 cmd.exe PING.EXE PID 4588 wrote to memory of 4636 4588 cmd.exe PING.EXE PID 4588 wrote to memory of 4636 4588 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\01935820a2e1dd3a82cd13993bf9cac65ae5bbced217fa21fdf132807457c5a4.exe"C:\Users\Admin\AppData\Local\Temp\01935820a2e1dd3a82cd13993bf9cac65ae5bbced217fa21fdf132807457c5a4.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:1572
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\01935820a2e1dd3a82cd13993bf9cac65ae5bbced217fa21fdf132807457c5a4.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:4636
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2656
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4692
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
238b40d86c094855ccf0653bf6e6bd95
SHA14f3575b984709fcf5ebc31f3edc93b232b4315dd
SHA256f387f458c4b76c4650be810372e9e618e0bf362c0b7a3a15eef7134cf7abee6e
SHA512c5a42f735a4cac517660369d45fa37f212c5d10f9c64f99db8590e49c0dd5ea726faf2fe0c1a2c4e212823801d3d3a26192505d9dc526d5802539d4e2e0acdb8
-
MD5
238b40d86c094855ccf0653bf6e6bd95
SHA14f3575b984709fcf5ebc31f3edc93b232b4315dd
SHA256f387f458c4b76c4650be810372e9e618e0bf362c0b7a3a15eef7134cf7abee6e
SHA512c5a42f735a4cac517660369d45fa37f212c5d10f9c64f99db8590e49c0dd5ea726faf2fe0c1a2c4e212823801d3d3a26192505d9dc526d5802539d4e2e0acdb8