Analysis
-
max time kernel
281s -
max time network
284s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
28-02-2022 15:53
Static task
static1
Behavioral task
behavioral1
Sample
b0144b6b820bbd7e84f82b2cbc63dfe25b858dd39f70e52efca66f5d5104046e.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
b0144b6b820bbd7e84f82b2cbc63dfe25b858dd39f70e52efca66f5d5104046e.exe
Resource
win10-en-20211208
Behavioral task
behavioral3
Sample
b0144b6b820bbd7e84f82b2cbc63dfe25b858dd39f70e52efca66f5d5104046e.exe
Resource
win10v2004-en-20220113
General
-
Target
b0144b6b820bbd7e84f82b2cbc63dfe25b858dd39f70e52efca66f5d5104046e.exe
-
Size
76KB
-
MD5
f032614326676138de5a4dc97ddc87e5
-
SHA1
a55a86bdd0f40b8a8801cacbbc025a8f58a5aeec
-
SHA256
b0144b6b820bbd7e84f82b2cbc63dfe25b858dd39f70e52efca66f5d5104046e
-
SHA512
3fd27b90ebfd2c94369bc432d082baa88c8c53b1aa83fae2e5c03f9e59f53c7520071a79e968abd232e2998c27176a011e038c7900ddea3dba6b97812ef13456
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 1992 MediaCenter.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" reg.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
b0144b6b820bbd7e84f82b2cbc63dfe25b858dd39f70e52efca66f5d5104046e.execmd.execmd.execmd.exedescription pid process target process PID 3540 wrote to memory of 3296 3540 b0144b6b820bbd7e84f82b2cbc63dfe25b858dd39f70e52efca66f5d5104046e.exe cmd.exe PID 3540 wrote to memory of 3296 3540 b0144b6b820bbd7e84f82b2cbc63dfe25b858dd39f70e52efca66f5d5104046e.exe cmd.exe PID 3540 wrote to memory of 3296 3540 b0144b6b820bbd7e84f82b2cbc63dfe25b858dd39f70e52efca66f5d5104046e.exe cmd.exe PID 3540 wrote to memory of 3592 3540 b0144b6b820bbd7e84f82b2cbc63dfe25b858dd39f70e52efca66f5d5104046e.exe cmd.exe PID 3540 wrote to memory of 3592 3540 b0144b6b820bbd7e84f82b2cbc63dfe25b858dd39f70e52efca66f5d5104046e.exe cmd.exe PID 3540 wrote to memory of 3592 3540 b0144b6b820bbd7e84f82b2cbc63dfe25b858dd39f70e52efca66f5d5104046e.exe cmd.exe PID 3540 wrote to memory of 4088 3540 b0144b6b820bbd7e84f82b2cbc63dfe25b858dd39f70e52efca66f5d5104046e.exe cmd.exe PID 3540 wrote to memory of 4088 3540 b0144b6b820bbd7e84f82b2cbc63dfe25b858dd39f70e52efca66f5d5104046e.exe cmd.exe PID 3540 wrote to memory of 4088 3540 b0144b6b820bbd7e84f82b2cbc63dfe25b858dd39f70e52efca66f5d5104046e.exe cmd.exe PID 3592 wrote to memory of 1992 3592 cmd.exe MediaCenter.exe PID 3592 wrote to memory of 1992 3592 cmd.exe MediaCenter.exe PID 3592 wrote to memory of 1992 3592 cmd.exe MediaCenter.exe PID 4088 wrote to memory of 2744 4088 cmd.exe PING.EXE PID 4088 wrote to memory of 2744 4088 cmd.exe PING.EXE PID 4088 wrote to memory of 2744 4088 cmd.exe PING.EXE PID 3296 wrote to memory of 3052 3296 cmd.exe reg.exe PID 3296 wrote to memory of 3052 3296 cmd.exe reg.exe PID 3296 wrote to memory of 3052 3296 cmd.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0144b6b820bbd7e84f82b2cbc63dfe25b858dd39f70e52efca66f5d5104046e.exe"C:\Users\Admin\AppData\Local\Temp\b0144b6b820bbd7e84f82b2cbc63dfe25b858dd39f70e52efca66f5d5104046e.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v "MicroMedia" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v "MicroMedia" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"3⤵
- Adds Run key to start application
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd.exe /c "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ping 127.0.0.1 & del "C:\Users\Admin\AppData\Local\Temp\b0144b6b820bbd7e84f82b2cbc63dfe25b858dd39f70e52efca66f5d5104046e.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeMD5
16f86f85565789cc412fd969568f6b3f
SHA1b93351735aeda1aa18925679a153cb407293f0bf
SHA2568323c5af48eeee648561b8d4f45d4a93750ec0784215dbaef1c52571f758f72d
SHA512e3b2fbd01506a2226a8a43cd20cb02474bb4cab900235a2223c0188ba39b7a208b804b2bd77f10af7fad5d0d5a00a94b92350a445004d15beb6ffaefcfb7848a
-
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeMD5
16f86f85565789cc412fd969568f6b3f
SHA1b93351735aeda1aa18925679a153cb407293f0bf
SHA2568323c5af48eeee648561b8d4f45d4a93750ec0784215dbaef1c52571f758f72d
SHA512e3b2fbd01506a2226a8a43cd20cb02474bb4cab900235a2223c0188ba39b7a208b804b2bd77f10af7fad5d0d5a00a94b92350a445004d15beb6ffaefcfb7848a
-
memory/3540-115-0x0000000000401000-0x0000000000404000-memory.dmpFilesize
12KB