Analysis
-
max time kernel
128s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
17-03-2022 18:15
Static task
static1
Behavioral task
behavioral1
Sample
4f5363c919c970e147753a3b89cb0d216a1053029e48ebfd9037a5d2931fb67a.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
4f5363c919c970e147753a3b89cb0d216a1053029e48ebfd9037a5d2931fb67a.exe
Resource
win10v2004-en-20220113
General
-
Target
4f5363c919c970e147753a3b89cb0d216a1053029e48ebfd9037a5d2931fb67a.exe
-
Size
76KB
-
MD5
023100d1d8ea30ded733c45dd61a94af
-
SHA1
6914992f8245f8ad6eb6662d318e77fa75412060
-
SHA256
4f5363c919c970e147753a3b89cb0d216a1053029e48ebfd9037a5d2931fb67a
-
SHA512
afff80139e3ffd57d90da376aa1ced923be09c3c26145cae9c359e55531aab8cb0a1a83346a39126de6480890d4c19570b544cd2d71d953cccfaaffcd8a64fcc
Malware Config
Signatures
-
suricata: ET MALWARE Possible DEEP PANDA C2 Activity
suricata: ET MALWARE Possible DEEP PANDA C2 Activity
-
suricata: ET MALWARE Possible Deep Panda - Sakula/Mivast RAT CnC Beacon 5
suricata: ET MALWARE Possible Deep Panda - Sakula/Mivast RAT CnC Beacon 5
-
suricata: ET MALWARE Sakula/Mivast C2 Activity
suricata: ET MALWARE Sakula/Mivast C2 Activity
-
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 60 MediaCenter.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" reg.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
4f5363c919c970e147753a3b89cb0d216a1053029e48ebfd9037a5d2931fb67a.execmd.execmd.execmd.exedescription pid process target process PID 2748 wrote to memory of 4856 2748 4f5363c919c970e147753a3b89cb0d216a1053029e48ebfd9037a5d2931fb67a.exe cmd.exe PID 2748 wrote to memory of 4856 2748 4f5363c919c970e147753a3b89cb0d216a1053029e48ebfd9037a5d2931fb67a.exe cmd.exe PID 2748 wrote to memory of 4856 2748 4f5363c919c970e147753a3b89cb0d216a1053029e48ebfd9037a5d2931fb67a.exe cmd.exe PID 2748 wrote to memory of 4752 2748 4f5363c919c970e147753a3b89cb0d216a1053029e48ebfd9037a5d2931fb67a.exe cmd.exe PID 2748 wrote to memory of 4752 2748 4f5363c919c970e147753a3b89cb0d216a1053029e48ebfd9037a5d2931fb67a.exe cmd.exe PID 2748 wrote to memory of 4752 2748 4f5363c919c970e147753a3b89cb0d216a1053029e48ebfd9037a5d2931fb67a.exe cmd.exe PID 2748 wrote to memory of 5008 2748 4f5363c919c970e147753a3b89cb0d216a1053029e48ebfd9037a5d2931fb67a.exe cmd.exe PID 2748 wrote to memory of 5008 2748 4f5363c919c970e147753a3b89cb0d216a1053029e48ebfd9037a5d2931fb67a.exe cmd.exe PID 2748 wrote to memory of 5008 2748 4f5363c919c970e147753a3b89cb0d216a1053029e48ebfd9037a5d2931fb67a.exe cmd.exe PID 5008 wrote to memory of 1136 5008 cmd.exe PING.EXE PID 5008 wrote to memory of 1136 5008 cmd.exe PING.EXE PID 5008 wrote to memory of 1136 5008 cmd.exe PING.EXE PID 4856 wrote to memory of 1892 4856 cmd.exe reg.exe PID 4856 wrote to memory of 1892 4856 cmd.exe reg.exe PID 4856 wrote to memory of 1892 4856 cmd.exe reg.exe PID 4752 wrote to memory of 60 4752 cmd.exe MediaCenter.exe PID 4752 wrote to memory of 60 4752 cmd.exe MediaCenter.exe PID 4752 wrote to memory of 60 4752 cmd.exe MediaCenter.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f5363c919c970e147753a3b89cb0d216a1053029e48ebfd9037a5d2931fb67a.exe"C:\Users\Admin\AppData\Local\Temp\4f5363c919c970e147753a3b89cb0d216a1053029e48ebfd9037a5d2931fb67a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\cmd.execmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v "MicroMedia" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\SysWOW64\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v "MicroMedia" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"3⤵
- Adds Run key to start application
- Modifies registry key
PID:1892 -
C:\Windows\SysWOW64\cmd.execmd.exe /c "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe3⤵
- Executes dropped EXE
PID:60 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ping 127.0.0.1 & del "C:\Users\Admin\AppData\Local\Temp\4f5363c919c970e147753a3b89cb0d216a1053029e48ebfd9037a5d2931fb67a.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1136
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
9db7bd92d78e5df872db906642e21725
SHA1e3005f7ee1a089b18192afc63283eb3a1d1971ab
SHA25606b4545a2397ad765aa1371740126d9a56803aa055e713c9c4f56a92baf0fc3c
SHA512f9b2d70b286183f42c9debbce7da24532df2f1af43f5ecec322de4dd851fc48eaa2c474bd5f38440d13268028f6dc8dbc27187dd4e83256ea187634d5cb377d2
-
MD5
9db7bd92d78e5df872db906642e21725
SHA1e3005f7ee1a089b18192afc63283eb3a1d1971ab
SHA25606b4545a2397ad765aa1371740126d9a56803aa055e713c9c4f56a92baf0fc3c
SHA512f9b2d70b286183f42c9debbce7da24532df2f1af43f5ecec322de4dd851fc48eaa2c474bd5f38440d13268028f6dc8dbc27187dd4e83256ea187634d5cb377d2