Analysis
-
max time kernel
147s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20220310-en -
submitted
20-03-2022 05:57
Static task
static1
Behavioral task
behavioral1
Sample
280622602950739b9b13be1aa783a895f674e85d0dccf78d6350bcaa214361a7.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
280622602950739b9b13be1aa783a895f674e85d0dccf78d6350bcaa214361a7.exe
Resource
win10v2004-20220310-en
General
-
Target
280622602950739b9b13be1aa783a895f674e85d0dccf78d6350bcaa214361a7.exe
-
Size
72KB
-
MD5
007a14d72f82e5718e99f23cefbad5c3
-
SHA1
01bb44f4fb23529ee35a21b0aeb9dd397d72ad90
-
SHA256
280622602950739b9b13be1aa783a895f674e85d0dccf78d6350bcaa214361a7
-
SHA512
dac91685a48c284cd02b877df5262883925b955473b7f19e18c6ba68e71ed95ad6e66d49be3ef846b284ce8577508cdd68151eb744add2937f1a2666d76ebfd9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 3716 MediaCenter.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run reg.exe -
Drops file in System32 directory 2 IoCs
Processes:
svchost.exedescription ioc process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{C579840E-7AAB-4BE5-878F-E9F2F0A572D9}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{6E7307F9-E79A-441A-A7F5-77E96C761E3C}.catalogItem svchost.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
280622602950739b9b13be1aa783a895f674e85d0dccf78d6350bcaa214361a7.execmd.execmd.execmd.exedescription pid process target process PID 3464 wrote to memory of 3016 3464 280622602950739b9b13be1aa783a895f674e85d0dccf78d6350bcaa214361a7.exe cmd.exe PID 3464 wrote to memory of 3016 3464 280622602950739b9b13be1aa783a895f674e85d0dccf78d6350bcaa214361a7.exe cmd.exe PID 3464 wrote to memory of 3016 3464 280622602950739b9b13be1aa783a895f674e85d0dccf78d6350bcaa214361a7.exe cmd.exe PID 3464 wrote to memory of 3984 3464 280622602950739b9b13be1aa783a895f674e85d0dccf78d6350bcaa214361a7.exe cmd.exe PID 3464 wrote to memory of 3984 3464 280622602950739b9b13be1aa783a895f674e85d0dccf78d6350bcaa214361a7.exe cmd.exe PID 3464 wrote to memory of 3984 3464 280622602950739b9b13be1aa783a895f674e85d0dccf78d6350bcaa214361a7.exe cmd.exe PID 3464 wrote to memory of 2448 3464 280622602950739b9b13be1aa783a895f674e85d0dccf78d6350bcaa214361a7.exe cmd.exe PID 3464 wrote to memory of 2448 3464 280622602950739b9b13be1aa783a895f674e85d0dccf78d6350bcaa214361a7.exe cmd.exe PID 3464 wrote to memory of 2448 3464 280622602950739b9b13be1aa783a895f674e85d0dccf78d6350bcaa214361a7.exe cmd.exe PID 3016 wrote to memory of 3764 3016 cmd.exe reg.exe PID 3016 wrote to memory of 3764 3016 cmd.exe reg.exe PID 3016 wrote to memory of 3764 3016 cmd.exe reg.exe PID 2448 wrote to memory of 3744 2448 cmd.exe PING.EXE PID 2448 wrote to memory of 3744 2448 cmd.exe PING.EXE PID 2448 wrote to memory of 3744 2448 cmd.exe PING.EXE PID 3984 wrote to memory of 3716 3984 cmd.exe MediaCenter.exe PID 3984 wrote to memory of 3716 3984 cmd.exe MediaCenter.exe PID 3984 wrote to memory of 3716 3984 cmd.exe MediaCenter.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\280622602950739b9b13be1aa783a895f674e85d0dccf78d6350bcaa214361a7.exe"C:\Users\Admin\AppData\Local\Temp\280622602950739b9b13be1aa783a895f674e85d0dccf78d6350bcaa214361a7.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v "MicroMedia" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v "MicroMedia" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"3⤵
- Adds Run key to start application
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd.exe /c "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ping 127.0.0.1 & del "C:\Users\Admin\AppData\Local\Temp\280622602950739b9b13be1aa783a895f674e85d0dccf78d6350bcaa214361a7.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeMD5
410422fe8bff1a11fd69980ea879fa4f
SHA13743d56d27603e856377660c98d5f63dcc6cf9a8
SHA256e22ee7b25c493600004b75b2039426f50ae30b2e845f8c417b4aa9a9cc7d12fd
SHA512e243a77ea7d6c4d69ab485463bbfe105ca133b3f847ec88605fa4fdf5c261602ec44dad8790f8bb05bd674917880c59dcaaa31695cef81b4e4ac0f6910c2b281
-
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeMD5
410422fe8bff1a11fd69980ea879fa4f
SHA13743d56d27603e856377660c98d5f63dcc6cf9a8
SHA256e22ee7b25c493600004b75b2039426f50ae30b2e845f8c417b4aa9a9cc7d12fd
SHA512e243a77ea7d6c4d69ab485463bbfe105ca133b3f847ec88605fa4fdf5c261602ec44dad8790f8bb05bd674917880c59dcaaa31695cef81b4e4ac0f6910c2b281
-
memory/3464-134-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/3716-137-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB