Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
23-03-2022 09:35
Static task
static1
Behavioral task
behavioral1
Sample
dd97fc50c2d66e182adc190aaa8740f60df6d801bf221d69184032c62c44c89a.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
dd97fc50c2d66e182adc190aaa8740f60df6d801bf221d69184032c62c44c89a.exe
Resource
win10v2004-en-20220113
General
-
Target
dd97fc50c2d66e182adc190aaa8740f60df6d801bf221d69184032c62c44c89a.exe
-
Size
36KB
-
MD5
c1742828c782abc124b3383573bc9099
-
SHA1
34f145bdaa7c0cf0ce6535725cc88a4099badcf5
-
SHA256
dd97fc50c2d66e182adc190aaa8740f60df6d801bf221d69184032c62c44c89a
-
SHA512
5249c3c9428cda5af61f8d62a44a12d222c1dfce49635e4db330350625da86921cb27f137e6382cb10f7fd05f089866df0c8315c79cee01a89b577980b12c36b
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 696 MediaCenter.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
dd97fc50c2d66e182adc190aaa8740f60df6d801bf221d69184032c62c44c89a.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation dd97fc50c2d66e182adc190aaa8740f60df6d801bf221d69184032c62c44c89a.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
dd97fc50c2d66e182adc190aaa8740f60df6d801bf221d69184032c62c44c89a.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" dd97fc50c2d66e182adc190aaa8740f60df6d801bf221d69184032c62c44c89a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
dd97fc50c2d66e182adc190aaa8740f60df6d801bf221d69184032c62c44c89a.exedescription pid process Token: SeIncBasePriorityPrivilege 3304 dd97fc50c2d66e182adc190aaa8740f60df6d801bf221d69184032c62c44c89a.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
dd97fc50c2d66e182adc190aaa8740f60df6d801bf221d69184032c62c44c89a.execmd.exedescription pid process target process PID 3304 wrote to memory of 696 3304 dd97fc50c2d66e182adc190aaa8740f60df6d801bf221d69184032c62c44c89a.exe MediaCenter.exe PID 3304 wrote to memory of 696 3304 dd97fc50c2d66e182adc190aaa8740f60df6d801bf221d69184032c62c44c89a.exe MediaCenter.exe PID 3304 wrote to memory of 696 3304 dd97fc50c2d66e182adc190aaa8740f60df6d801bf221d69184032c62c44c89a.exe MediaCenter.exe PID 3304 wrote to memory of 4404 3304 dd97fc50c2d66e182adc190aaa8740f60df6d801bf221d69184032c62c44c89a.exe cmd.exe PID 3304 wrote to memory of 4404 3304 dd97fc50c2d66e182adc190aaa8740f60df6d801bf221d69184032c62c44c89a.exe cmd.exe PID 3304 wrote to memory of 4404 3304 dd97fc50c2d66e182adc190aaa8740f60df6d801bf221d69184032c62c44c89a.exe cmd.exe PID 4404 wrote to memory of 1664 4404 cmd.exe PING.EXE PID 4404 wrote to memory of 1664 4404 cmd.exe PING.EXE PID 4404 wrote to memory of 1664 4404 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd97fc50c2d66e182adc190aaa8740f60df6d801bf221d69184032c62c44c89a.exe"C:\Users\Admin\AppData\Local\Temp\dd97fc50c2d66e182adc190aaa8740f60df6d801bf221d69184032c62c44c89a.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
PID:696 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\dd97fc50c2d66e182adc190aaa8740f60df6d801bf221d69184032c62c44c89a.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1664
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
c8bbc3a9a06c1aa2183831e2ff824736
SHA1481fd61c6012df4efdec753433c97ad1858a5800
SHA256d17c616f26d62176f77b838e158cb2fe8a484dae6672f2ede5ae7610c98240ce
SHA5121aaf08b81bee0eeacd064660174d8c4c6d9b7fdaf98965f96b5ed2c216ce573a28ffb84a218dd5c123f331464614d2015fec68a56bf5127111d3d3a6923303eb
-
MD5
c8bbc3a9a06c1aa2183831e2ff824736
SHA1481fd61c6012df4efdec753433c97ad1858a5800
SHA256d17c616f26d62176f77b838e158cb2fe8a484dae6672f2ede5ae7610c98240ce
SHA5121aaf08b81bee0eeacd064660174d8c4c6d9b7fdaf98965f96b5ed2c216ce573a28ffb84a218dd5c123f331464614d2015fec68a56bf5127111d3d3a6923303eb