Analysis
-
max time kernel
4294193s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20220310-en -
submitted
26-03-2022 03:40
Static task
static1
Behavioral task
behavioral1
Sample
962398a8148727431d8a651dcacbb972883559f651f19784a0a0cd9c30c63a2f.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
962398a8148727431d8a651dcacbb972883559f651f19784a0a0cd9c30c63a2f.exe
Resource
win10v2004-en-20220113
General
-
Target
962398a8148727431d8a651dcacbb972883559f651f19784a0a0cd9c30c63a2f.exe
-
Size
42KB
-
MD5
0df6396e7775f62dba90ff08a846cc34
-
SHA1
6bbc28cd80acc12f222c45b8ab93a7b34f0d6b48
-
SHA256
962398a8148727431d8a651dcacbb972883559f651f19784a0a0cd9c30c63a2f
-
SHA512
7f46b8d2b8f0281d249e626c9e1dcbffe1b8054ea926e3bbb53cceb029d40843a33c986bc6d17ebbec992b395cf288e2b61e37a3d42036eef9c5f1521e24c2df
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 1744 MediaCenter.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2044 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
cmd.exepid process 1196 cmd.exe 1196 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" reg.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
962398a8148727431d8a651dcacbb972883559f651f19784a0a0cd9c30c63a2f.execmd.execmd.execmd.exedescription pid process target process PID 2016 wrote to memory of 1980 2016 962398a8148727431d8a651dcacbb972883559f651f19784a0a0cd9c30c63a2f.exe cmd.exe PID 2016 wrote to memory of 1980 2016 962398a8148727431d8a651dcacbb972883559f651f19784a0a0cd9c30c63a2f.exe cmd.exe PID 2016 wrote to memory of 1980 2016 962398a8148727431d8a651dcacbb972883559f651f19784a0a0cd9c30c63a2f.exe cmd.exe PID 2016 wrote to memory of 1980 2016 962398a8148727431d8a651dcacbb972883559f651f19784a0a0cd9c30c63a2f.exe cmd.exe PID 2016 wrote to memory of 1196 2016 962398a8148727431d8a651dcacbb972883559f651f19784a0a0cd9c30c63a2f.exe cmd.exe PID 2016 wrote to memory of 1196 2016 962398a8148727431d8a651dcacbb972883559f651f19784a0a0cd9c30c63a2f.exe cmd.exe PID 2016 wrote to memory of 1196 2016 962398a8148727431d8a651dcacbb972883559f651f19784a0a0cd9c30c63a2f.exe cmd.exe PID 2016 wrote to memory of 1196 2016 962398a8148727431d8a651dcacbb972883559f651f19784a0a0cd9c30c63a2f.exe cmd.exe PID 2016 wrote to memory of 2044 2016 962398a8148727431d8a651dcacbb972883559f651f19784a0a0cd9c30c63a2f.exe cmd.exe PID 2016 wrote to memory of 2044 2016 962398a8148727431d8a651dcacbb972883559f651f19784a0a0cd9c30c63a2f.exe cmd.exe PID 2016 wrote to memory of 2044 2016 962398a8148727431d8a651dcacbb972883559f651f19784a0a0cd9c30c63a2f.exe cmd.exe PID 2016 wrote to memory of 2044 2016 962398a8148727431d8a651dcacbb972883559f651f19784a0a0cd9c30c63a2f.exe cmd.exe PID 2044 wrote to memory of 820 2044 cmd.exe PING.EXE PID 2044 wrote to memory of 820 2044 cmd.exe PING.EXE PID 2044 wrote to memory of 820 2044 cmd.exe PING.EXE PID 2044 wrote to memory of 820 2044 cmd.exe PING.EXE PID 1196 wrote to memory of 1744 1196 cmd.exe MediaCenter.exe PID 1196 wrote to memory of 1744 1196 cmd.exe MediaCenter.exe PID 1196 wrote to memory of 1744 1196 cmd.exe MediaCenter.exe PID 1196 wrote to memory of 1744 1196 cmd.exe MediaCenter.exe PID 1980 wrote to memory of 1880 1980 cmd.exe reg.exe PID 1980 wrote to memory of 1880 1980 cmd.exe reg.exe PID 1980 wrote to memory of 1880 1980 cmd.exe reg.exe PID 1980 wrote to memory of 1880 1980 cmd.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\962398a8148727431d8a651dcacbb972883559f651f19784a0a0cd9c30c63a2f.exe"C:\Users\Admin\AppData\Local\Temp\962398a8148727431d8a651dcacbb972883559f651f19784a0a0cd9c30c63a2f.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v "MicroMedia" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v "MicroMedia" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"3⤵
- Adds Run key to start application
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd.exe /c "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ping 127.0.0.1 & del "C:\Users\Admin\AppData\Local\Temp\962398a8148727431d8a651dcacbb972883559f651f19784a0a0cd9c30c63a2f.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeMD5
0f014d58b4cc6411e5ec4ca445dcbdbf
SHA1e895e3ddaf1dace0ac4e65e46fbf34ec89c655fe
SHA25620712d629b8b42dd8e73a5ae255c76b7d933a83f5c348d52ff5645332d394613
SHA5120fac9485b1750aff2996effd6a13a2e507d501c357a32ab625b4f4ee4309c1209cd743c211a06b1361c6dff3bceba72e4913176c602bcbc56b6274dbfd554b32
-
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeMD5
0f014d58b4cc6411e5ec4ca445dcbdbf
SHA1e895e3ddaf1dace0ac4e65e46fbf34ec89c655fe
SHA25620712d629b8b42dd8e73a5ae255c76b7d933a83f5c348d52ff5645332d394613
SHA5120fac9485b1750aff2996effd6a13a2e507d501c357a32ab625b4f4ee4309c1209cd743c211a06b1361c6dff3bceba72e4913176c602bcbc56b6274dbfd554b32
-
\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeMD5
0f014d58b4cc6411e5ec4ca445dcbdbf
SHA1e895e3ddaf1dace0ac4e65e46fbf34ec89c655fe
SHA25620712d629b8b42dd8e73a5ae255c76b7d933a83f5c348d52ff5645332d394613
SHA5120fac9485b1750aff2996effd6a13a2e507d501c357a32ab625b4f4ee4309c1209cd743c211a06b1361c6dff3bceba72e4913176c602bcbc56b6274dbfd554b32
-
\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeMD5
0f014d58b4cc6411e5ec4ca445dcbdbf
SHA1e895e3ddaf1dace0ac4e65e46fbf34ec89c655fe
SHA25620712d629b8b42dd8e73a5ae255c76b7d933a83f5c348d52ff5645332d394613
SHA5120fac9485b1750aff2996effd6a13a2e507d501c357a32ab625b4f4ee4309c1209cd743c211a06b1361c6dff3bceba72e4913176c602bcbc56b6274dbfd554b32
-
memory/820-61-0x0000000000000000-mapping.dmp
-
memory/1196-57-0x0000000000000000-mapping.dmp
-
memory/1744-63-0x0000000000000000-mapping.dmp
-
memory/1880-66-0x0000000000000000-mapping.dmp
-
memory/1980-56-0x0000000000000000-mapping.dmp
-
memory/2016-54-0x00000000765D1000-0x00000000765D3000-memory.dmpFilesize
8KB
-
memory/2016-55-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/2044-58-0x0000000000000000-mapping.dmp