Analysis
-
max time kernel
241s -
max time network
273s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
28-02-2022 15:53
Static task
static1
Behavioral task
behavioral1
Sample
b0144b6b820bbd7e84f82b2cbc63dfe25b858dd39f70e52efca66f5d5104046e.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
b0144b6b820bbd7e84f82b2cbc63dfe25b858dd39f70e52efca66f5d5104046e.exe
Resource
win10-en-20211208
Behavioral task
behavioral3
Sample
b0144b6b820bbd7e84f82b2cbc63dfe25b858dd39f70e52efca66f5d5104046e.exe
Resource
win10v2004-en-20220113
General
-
Target
b0144b6b820bbd7e84f82b2cbc63dfe25b858dd39f70e52efca66f5d5104046e.exe
-
Size
76KB
-
MD5
f032614326676138de5a4dc97ddc87e5
-
SHA1
a55a86bdd0f40b8a8801cacbbc025a8f58a5aeec
-
SHA256
b0144b6b820bbd7e84f82b2cbc63dfe25b858dd39f70e52efca66f5d5104046e
-
SHA512
3fd27b90ebfd2c94369bc432d082baa88c8c53b1aa83fae2e5c03f9e59f53c7520071a79e968abd232e2998c27176a011e038c7900ddea3dba6b97812ef13456
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 2604 MediaCenter.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" reg.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
b0144b6b820bbd7e84f82b2cbc63dfe25b858dd39f70e52efca66f5d5104046e.execmd.execmd.execmd.exedescription pid process target process PID 3320 wrote to memory of 1248 3320 b0144b6b820bbd7e84f82b2cbc63dfe25b858dd39f70e52efca66f5d5104046e.exe cmd.exe PID 3320 wrote to memory of 1248 3320 b0144b6b820bbd7e84f82b2cbc63dfe25b858dd39f70e52efca66f5d5104046e.exe cmd.exe PID 3320 wrote to memory of 1248 3320 b0144b6b820bbd7e84f82b2cbc63dfe25b858dd39f70e52efca66f5d5104046e.exe cmd.exe PID 3320 wrote to memory of 1352 3320 b0144b6b820bbd7e84f82b2cbc63dfe25b858dd39f70e52efca66f5d5104046e.exe cmd.exe PID 3320 wrote to memory of 1352 3320 b0144b6b820bbd7e84f82b2cbc63dfe25b858dd39f70e52efca66f5d5104046e.exe cmd.exe PID 3320 wrote to memory of 1352 3320 b0144b6b820bbd7e84f82b2cbc63dfe25b858dd39f70e52efca66f5d5104046e.exe cmd.exe PID 3320 wrote to memory of 1400 3320 b0144b6b820bbd7e84f82b2cbc63dfe25b858dd39f70e52efca66f5d5104046e.exe cmd.exe PID 3320 wrote to memory of 1400 3320 b0144b6b820bbd7e84f82b2cbc63dfe25b858dd39f70e52efca66f5d5104046e.exe cmd.exe PID 3320 wrote to memory of 1400 3320 b0144b6b820bbd7e84f82b2cbc63dfe25b858dd39f70e52efca66f5d5104046e.exe cmd.exe PID 1400 wrote to memory of 2764 1400 cmd.exe PING.EXE PID 1400 wrote to memory of 2764 1400 cmd.exe PING.EXE PID 1400 wrote to memory of 2764 1400 cmd.exe PING.EXE PID 1248 wrote to memory of 2336 1248 cmd.exe reg.exe PID 1248 wrote to memory of 2336 1248 cmd.exe reg.exe PID 1248 wrote to memory of 2336 1248 cmd.exe reg.exe PID 1352 wrote to memory of 2604 1352 cmd.exe MediaCenter.exe PID 1352 wrote to memory of 2604 1352 cmd.exe MediaCenter.exe PID 1352 wrote to memory of 2604 1352 cmd.exe MediaCenter.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0144b6b820bbd7e84f82b2cbc63dfe25b858dd39f70e52efca66f5d5104046e.exe"C:\Users\Admin\AppData\Local\Temp\b0144b6b820bbd7e84f82b2cbc63dfe25b858dd39f70e52efca66f5d5104046e.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v "MicroMedia" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v "MicroMedia" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"3⤵
- Adds Run key to start application
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd.exe /c "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ping 127.0.0.1 & del "C:\Users\Admin\AppData\Local\Temp\b0144b6b820bbd7e84f82b2cbc63dfe25b858dd39f70e52efca66f5d5104046e.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeMD5
348cab12013d0bb99563504ccfe6f2c4
SHA190858489641a388d19d27cdbd4c89d83e89cf7c1
SHA256fdd8e6b083d810cdafc02070008c1b9c990bc99a860b8756dd3867766181a79f
SHA512de922692a294a10639976fd91565e99b58ab2db25651f0ea23944209028b33c46381f9a95b3199e78893c81ed554b4495d2baa514d9c97d6d9d33f06f0e75726
-
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeMD5
348cab12013d0bb99563504ccfe6f2c4
SHA190858489641a388d19d27cdbd4c89d83e89cf7c1
SHA256fdd8e6b083d810cdafc02070008c1b9c990bc99a860b8756dd3867766181a79f
SHA512de922692a294a10639976fd91565e99b58ab2db25651f0ea23944209028b33c46381f9a95b3199e78893c81ed554b4495d2baa514d9c97d6d9d33f06f0e75726
-
memory/3320-130-0x0000000000401000-0x0000000000404000-memory.dmpFilesize
12KB