Analysis
-
max time kernel
4294193s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220310-en -
submitted
23-03-2022 09:35
Static task
static1
Behavioral task
behavioral1
Sample
dd97fc50c2d66e182adc190aaa8740f60df6d801bf221d69184032c62c44c89a.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
dd97fc50c2d66e182adc190aaa8740f60df6d801bf221d69184032c62c44c89a.exe
Resource
win10v2004-en-20220113
General
-
Target
dd97fc50c2d66e182adc190aaa8740f60df6d801bf221d69184032c62c44c89a.exe
-
Size
36KB
-
MD5
c1742828c782abc124b3383573bc9099
-
SHA1
34f145bdaa7c0cf0ce6535725cc88a4099badcf5
-
SHA256
dd97fc50c2d66e182adc190aaa8740f60df6d801bf221d69184032c62c44c89a
-
SHA512
5249c3c9428cda5af61f8d62a44a12d222c1dfce49635e4db330350625da86921cb27f137e6382cb10f7fd05f089866df0c8315c79cee01a89b577980b12c36b
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 1620 MediaCenter.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1408 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
dd97fc50c2d66e182adc190aaa8740f60df6d801bf221d69184032c62c44c89a.exepid process 1568 dd97fc50c2d66e182adc190aaa8740f60df6d801bf221d69184032c62c44c89a.exe 1568 dd97fc50c2d66e182adc190aaa8740f60df6d801bf221d69184032c62c44c89a.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
dd97fc50c2d66e182adc190aaa8740f60df6d801bf221d69184032c62c44c89a.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" dd97fc50c2d66e182adc190aaa8740f60df6d801bf221d69184032c62c44c89a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
dd97fc50c2d66e182adc190aaa8740f60df6d801bf221d69184032c62c44c89a.exedescription pid process Token: SeIncBasePriorityPrivilege 1568 dd97fc50c2d66e182adc190aaa8740f60df6d801bf221d69184032c62c44c89a.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
dd97fc50c2d66e182adc190aaa8740f60df6d801bf221d69184032c62c44c89a.execmd.exedescription pid process target process PID 1568 wrote to memory of 1620 1568 dd97fc50c2d66e182adc190aaa8740f60df6d801bf221d69184032c62c44c89a.exe MediaCenter.exe PID 1568 wrote to memory of 1620 1568 dd97fc50c2d66e182adc190aaa8740f60df6d801bf221d69184032c62c44c89a.exe MediaCenter.exe PID 1568 wrote to memory of 1620 1568 dd97fc50c2d66e182adc190aaa8740f60df6d801bf221d69184032c62c44c89a.exe MediaCenter.exe PID 1568 wrote to memory of 1620 1568 dd97fc50c2d66e182adc190aaa8740f60df6d801bf221d69184032c62c44c89a.exe MediaCenter.exe PID 1568 wrote to memory of 1408 1568 dd97fc50c2d66e182adc190aaa8740f60df6d801bf221d69184032c62c44c89a.exe cmd.exe PID 1568 wrote to memory of 1408 1568 dd97fc50c2d66e182adc190aaa8740f60df6d801bf221d69184032c62c44c89a.exe cmd.exe PID 1568 wrote to memory of 1408 1568 dd97fc50c2d66e182adc190aaa8740f60df6d801bf221d69184032c62c44c89a.exe cmd.exe PID 1568 wrote to memory of 1408 1568 dd97fc50c2d66e182adc190aaa8740f60df6d801bf221d69184032c62c44c89a.exe cmd.exe PID 1408 wrote to memory of 1604 1408 cmd.exe PING.EXE PID 1408 wrote to memory of 1604 1408 cmd.exe PING.EXE PID 1408 wrote to memory of 1604 1408 cmd.exe PING.EXE PID 1408 wrote to memory of 1604 1408 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd97fc50c2d66e182adc190aaa8740f60df6d801bf221d69184032c62c44c89a.exe"C:\Users\Admin\AppData\Local\Temp\dd97fc50c2d66e182adc190aaa8740f60df6d801bf221d69184032c62c44c89a.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:1620 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\dd97fc50c2d66e182adc190aaa8740f60df6d801bf221d69184032c62c44c89a.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1604
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
90b6f6f1b6d5fb1fb5e40cdda806589e
SHA1f99dd90449a03da27d525b068bbcc9c6ba535aae
SHA2567fbd323b596d4e6e9f1fc6aeb55b46223e04cbc71d647b225e04f04189166ce8
SHA512c8028a084d02ed6d43d661652a08a7c43a86434376ed8b66c09eca759b9bfb69978b852af892fcb31d3e1166873766737a14a8e2a1096392e92432a30f5da559
-
MD5
90b6f6f1b6d5fb1fb5e40cdda806589e
SHA1f99dd90449a03da27d525b068bbcc9c6ba535aae
SHA2567fbd323b596d4e6e9f1fc6aeb55b46223e04cbc71d647b225e04f04189166ce8
SHA512c8028a084d02ed6d43d661652a08a7c43a86434376ed8b66c09eca759b9bfb69978b852af892fcb31d3e1166873766737a14a8e2a1096392e92432a30f5da559
-
MD5
90b6f6f1b6d5fb1fb5e40cdda806589e
SHA1f99dd90449a03da27d525b068bbcc9c6ba535aae
SHA2567fbd323b596d4e6e9f1fc6aeb55b46223e04cbc71d647b225e04f04189166ce8
SHA512c8028a084d02ed6d43d661652a08a7c43a86434376ed8b66c09eca759b9bfb69978b852af892fcb31d3e1166873766737a14a8e2a1096392e92432a30f5da559