Analysis
-
max time kernel
4294183s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
17-03-2022 18:15
Static task
static1
Behavioral task
behavioral1
Sample
4f5363c919c970e147753a3b89cb0d216a1053029e48ebfd9037a5d2931fb67a.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
4f5363c919c970e147753a3b89cb0d216a1053029e48ebfd9037a5d2931fb67a.exe
Resource
win10v2004-en-20220113
General
-
Target
4f5363c919c970e147753a3b89cb0d216a1053029e48ebfd9037a5d2931fb67a.exe
-
Size
76KB
-
MD5
023100d1d8ea30ded733c45dd61a94af
-
SHA1
6914992f8245f8ad6eb6662d318e77fa75412060
-
SHA256
4f5363c919c970e147753a3b89cb0d216a1053029e48ebfd9037a5d2931fb67a
-
SHA512
afff80139e3ffd57d90da376aa1ced923be09c3c26145cae9c359e55531aab8cb0a1a83346a39126de6480890d4c19570b544cd2d71d953cccfaaffcd8a64fcc
Malware Config
Signatures
-
suricata: ET MALWARE Possible DEEP PANDA C2 Activity
suricata: ET MALWARE Possible DEEP PANDA C2 Activity
-
suricata: ET MALWARE Possible Deep Panda - Sakula/Mivast RAT CnC Beacon 5
suricata: ET MALWARE Possible Deep Panda - Sakula/Mivast RAT CnC Beacon 5
-
suricata: ET MALWARE Sakula/Mivast C2 Activity
suricata: ET MALWARE Sakula/Mivast C2 Activity
-
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 1428 MediaCenter.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 560 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
cmd.exepid process 1496 cmd.exe 1496 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" reg.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
4f5363c919c970e147753a3b89cb0d216a1053029e48ebfd9037a5d2931fb67a.execmd.execmd.execmd.exedescription pid process target process PID 1336 wrote to memory of 1132 1336 4f5363c919c970e147753a3b89cb0d216a1053029e48ebfd9037a5d2931fb67a.exe cmd.exe PID 1336 wrote to memory of 1132 1336 4f5363c919c970e147753a3b89cb0d216a1053029e48ebfd9037a5d2931fb67a.exe cmd.exe PID 1336 wrote to memory of 1132 1336 4f5363c919c970e147753a3b89cb0d216a1053029e48ebfd9037a5d2931fb67a.exe cmd.exe PID 1336 wrote to memory of 1132 1336 4f5363c919c970e147753a3b89cb0d216a1053029e48ebfd9037a5d2931fb67a.exe cmd.exe PID 1336 wrote to memory of 1496 1336 4f5363c919c970e147753a3b89cb0d216a1053029e48ebfd9037a5d2931fb67a.exe cmd.exe PID 1336 wrote to memory of 1496 1336 4f5363c919c970e147753a3b89cb0d216a1053029e48ebfd9037a5d2931fb67a.exe cmd.exe PID 1336 wrote to memory of 1496 1336 4f5363c919c970e147753a3b89cb0d216a1053029e48ebfd9037a5d2931fb67a.exe cmd.exe PID 1336 wrote to memory of 1496 1336 4f5363c919c970e147753a3b89cb0d216a1053029e48ebfd9037a5d2931fb67a.exe cmd.exe PID 1336 wrote to memory of 560 1336 4f5363c919c970e147753a3b89cb0d216a1053029e48ebfd9037a5d2931fb67a.exe cmd.exe PID 1336 wrote to memory of 560 1336 4f5363c919c970e147753a3b89cb0d216a1053029e48ebfd9037a5d2931fb67a.exe cmd.exe PID 1336 wrote to memory of 560 1336 4f5363c919c970e147753a3b89cb0d216a1053029e48ebfd9037a5d2931fb67a.exe cmd.exe PID 1336 wrote to memory of 560 1336 4f5363c919c970e147753a3b89cb0d216a1053029e48ebfd9037a5d2931fb67a.exe cmd.exe PID 560 wrote to memory of 1532 560 cmd.exe PING.EXE PID 560 wrote to memory of 1532 560 cmd.exe PING.EXE PID 560 wrote to memory of 1532 560 cmd.exe PING.EXE PID 560 wrote to memory of 1532 560 cmd.exe PING.EXE PID 1132 wrote to memory of 1444 1132 cmd.exe reg.exe PID 1132 wrote to memory of 1444 1132 cmd.exe reg.exe PID 1132 wrote to memory of 1444 1132 cmd.exe reg.exe PID 1132 wrote to memory of 1444 1132 cmd.exe reg.exe PID 1496 wrote to memory of 1428 1496 cmd.exe MediaCenter.exe PID 1496 wrote to memory of 1428 1496 cmd.exe MediaCenter.exe PID 1496 wrote to memory of 1428 1496 cmd.exe MediaCenter.exe PID 1496 wrote to memory of 1428 1496 cmd.exe MediaCenter.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f5363c919c970e147753a3b89cb0d216a1053029e48ebfd9037a5d2931fb67a.exe"C:\Users\Admin\AppData\Local\Temp\4f5363c919c970e147753a3b89cb0d216a1053029e48ebfd9037a5d2931fb67a.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v "MicroMedia" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v "MicroMedia" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"3⤵
- Adds Run key to start application
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd.exe /c "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ping 127.0.0.1 & del "C:\Users\Admin\AppData\Local\Temp\4f5363c919c970e147753a3b89cb0d216a1053029e48ebfd9037a5d2931fb67a.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeMD5
f9bcce7bfba23e2fa9c8ad513d49efcc
SHA12afd2871b1fb5e73a97d1dfc329881e78133864b
SHA256e79a3eb617387e8b9379d9ec361abfa598f493c22a60be46f1045b23d5fcd1ac
SHA5121c44819d832e7ceea38c7c80a2aad60f5a45945fb1708a5af64093ec2d0cc15925a0ed9ce9b2d996fb6e9b60f0f1289c8167815aef89675f7454ebe53a482bee
-
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeMD5
f9bcce7bfba23e2fa9c8ad513d49efcc
SHA12afd2871b1fb5e73a97d1dfc329881e78133864b
SHA256e79a3eb617387e8b9379d9ec361abfa598f493c22a60be46f1045b23d5fcd1ac
SHA5121c44819d832e7ceea38c7c80a2aad60f5a45945fb1708a5af64093ec2d0cc15925a0ed9ce9b2d996fb6e9b60f0f1289c8167815aef89675f7454ebe53a482bee
-
\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeMD5
f9bcce7bfba23e2fa9c8ad513d49efcc
SHA12afd2871b1fb5e73a97d1dfc329881e78133864b
SHA256e79a3eb617387e8b9379d9ec361abfa598f493c22a60be46f1045b23d5fcd1ac
SHA5121c44819d832e7ceea38c7c80a2aad60f5a45945fb1708a5af64093ec2d0cc15925a0ed9ce9b2d996fb6e9b60f0f1289c8167815aef89675f7454ebe53a482bee
-
\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeMD5
f9bcce7bfba23e2fa9c8ad513d49efcc
SHA12afd2871b1fb5e73a97d1dfc329881e78133864b
SHA256e79a3eb617387e8b9379d9ec361abfa598f493c22a60be46f1045b23d5fcd1ac
SHA5121c44819d832e7ceea38c7c80a2aad60f5a45945fb1708a5af64093ec2d0cc15925a0ed9ce9b2d996fb6e9b60f0f1289c8167815aef89675f7454ebe53a482bee
-
memory/1336-54-0x0000000075561000-0x0000000075563000-memory.dmpFilesize
8KB
-
memory/1336-55-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB