Analysis
-
max time kernel
135s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
03-06-2022 13:34
Static task
static1
Behavioral task
behavioral1
Sample
130d67c50bd649897b9198b090f6137b792a8415a03abf04b13063eaa93ac678.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
130d67c50bd649897b9198b090f6137b792a8415a03abf04b13063eaa93ac678.exe
Resource
win10v2004-20220414-en
General
-
Target
130d67c50bd649897b9198b090f6137b792a8415a03abf04b13063eaa93ac678.exe
-
Size
19KB
-
MD5
4f3cfe776b67016579985dcae493079c
-
SHA1
d7f77c3dabc8ee72bbaee9c8dcd5bfe79ce2f777
-
SHA256
130d67c50bd649897b9198b090f6137b792a8415a03abf04b13063eaa93ac678
-
SHA512
3b767573ad3919b7765a64ba31134e0a19a297fb72a4c9f7f89e72e3f9f0d1d69807a838d762c993cfa2bba1fa6f55c7c360296599b7f4d9e10c7923ae425066
Malware Config
Signatures
-
suricata: ET MALWARE Possible DEEP PANDA C2 Activity
suricata: ET MALWARE Possible DEEP PANDA C2 Activity
-
suricata: ET MALWARE Possible Deep Panda - Sakula/Mivast RAT CnC Beacon 5
suricata: ET MALWARE Possible Deep Panda - Sakula/Mivast RAT CnC Beacon 5
-
suricata: ET MALWARE Sakula/Mivast C2 Activity
suricata: ET MALWARE Sakula/Mivast C2 Activity
-
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 1640 MediaCenter.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 900 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
cmd.exepid process 1836 cmd.exe 1836 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" reg.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
130d67c50bd649897b9198b090f6137b792a8415a03abf04b13063eaa93ac678.execmd.execmd.execmd.exedescription pid process target process PID 1156 wrote to memory of 1656 1156 130d67c50bd649897b9198b090f6137b792a8415a03abf04b13063eaa93ac678.exe cmd.exe PID 1156 wrote to memory of 1656 1156 130d67c50bd649897b9198b090f6137b792a8415a03abf04b13063eaa93ac678.exe cmd.exe PID 1156 wrote to memory of 1656 1156 130d67c50bd649897b9198b090f6137b792a8415a03abf04b13063eaa93ac678.exe cmd.exe PID 1156 wrote to memory of 1656 1156 130d67c50bd649897b9198b090f6137b792a8415a03abf04b13063eaa93ac678.exe cmd.exe PID 1156 wrote to memory of 1836 1156 130d67c50bd649897b9198b090f6137b792a8415a03abf04b13063eaa93ac678.exe cmd.exe PID 1156 wrote to memory of 1836 1156 130d67c50bd649897b9198b090f6137b792a8415a03abf04b13063eaa93ac678.exe cmd.exe PID 1156 wrote to memory of 1836 1156 130d67c50bd649897b9198b090f6137b792a8415a03abf04b13063eaa93ac678.exe cmd.exe PID 1156 wrote to memory of 1836 1156 130d67c50bd649897b9198b090f6137b792a8415a03abf04b13063eaa93ac678.exe cmd.exe PID 1156 wrote to memory of 900 1156 130d67c50bd649897b9198b090f6137b792a8415a03abf04b13063eaa93ac678.exe cmd.exe PID 1156 wrote to memory of 900 1156 130d67c50bd649897b9198b090f6137b792a8415a03abf04b13063eaa93ac678.exe cmd.exe PID 1156 wrote to memory of 900 1156 130d67c50bd649897b9198b090f6137b792a8415a03abf04b13063eaa93ac678.exe cmd.exe PID 1156 wrote to memory of 900 1156 130d67c50bd649897b9198b090f6137b792a8415a03abf04b13063eaa93ac678.exe cmd.exe PID 1836 wrote to memory of 1640 1836 cmd.exe MediaCenter.exe PID 1836 wrote to memory of 1640 1836 cmd.exe MediaCenter.exe PID 1836 wrote to memory of 1640 1836 cmd.exe MediaCenter.exe PID 1836 wrote to memory of 1640 1836 cmd.exe MediaCenter.exe PID 900 wrote to memory of 1660 900 cmd.exe PING.EXE PID 900 wrote to memory of 1660 900 cmd.exe PING.EXE PID 900 wrote to memory of 1660 900 cmd.exe PING.EXE PID 900 wrote to memory of 1660 900 cmd.exe PING.EXE PID 1656 wrote to memory of 624 1656 cmd.exe reg.exe PID 1656 wrote to memory of 624 1656 cmd.exe reg.exe PID 1656 wrote to memory of 624 1656 cmd.exe reg.exe PID 1656 wrote to memory of 624 1656 cmd.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\130d67c50bd649897b9198b090f6137b792a8415a03abf04b13063eaa93ac678.exe"C:\Users\Admin\AppData\Local\Temp\130d67c50bd649897b9198b090f6137b792a8415a03abf04b13063eaa93ac678.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v "MicroMedia" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v "MicroMedia" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"3⤵
- Adds Run key to start application
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd.exe /c "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ping 127.0.0.1 & del "C:\Users\Admin\AppData\Local\Temp\130d67c50bd649897b9198b090f6137b792a8415a03abf04b13063eaa93ac678.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeFilesize
19KB
MD5e233a6fa76ec1bf0534d1a8cf22319a8
SHA11bc539d08e3f7c926e7ccfbd4ed5c51ec8d6a72b
SHA256061abbcf69694f86543b572c9e0930c1c349e7c7406a58d34cec2ede2e86886c
SHA5122ee2b7d909a193e560667be69c020bbb3b5100f90f1854f96b7dc2f9e0c8df2d0b9e302416ada7a18c81bfa0b31b477b5934855d2ad19b7f33604d90b4dfb00d
-
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeFilesize
19KB
MD5e233a6fa76ec1bf0534d1a8cf22319a8
SHA11bc539d08e3f7c926e7ccfbd4ed5c51ec8d6a72b
SHA256061abbcf69694f86543b572c9e0930c1c349e7c7406a58d34cec2ede2e86886c
SHA5122ee2b7d909a193e560667be69c020bbb3b5100f90f1854f96b7dc2f9e0c8df2d0b9e302416ada7a18c81bfa0b31b477b5934855d2ad19b7f33604d90b4dfb00d
-
\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeFilesize
19KB
MD5e233a6fa76ec1bf0534d1a8cf22319a8
SHA11bc539d08e3f7c926e7ccfbd4ed5c51ec8d6a72b
SHA256061abbcf69694f86543b572c9e0930c1c349e7c7406a58d34cec2ede2e86886c
SHA5122ee2b7d909a193e560667be69c020bbb3b5100f90f1854f96b7dc2f9e0c8df2d0b9e302416ada7a18c81bfa0b31b477b5934855d2ad19b7f33604d90b4dfb00d
-
\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeFilesize
19KB
MD5e233a6fa76ec1bf0534d1a8cf22319a8
SHA11bc539d08e3f7c926e7ccfbd4ed5c51ec8d6a72b
SHA256061abbcf69694f86543b572c9e0930c1c349e7c7406a58d34cec2ede2e86886c
SHA5122ee2b7d909a193e560667be69c020bbb3b5100f90f1854f96b7dc2f9e0c8df2d0b9e302416ada7a18c81bfa0b31b477b5934855d2ad19b7f33604d90b4dfb00d
-
memory/624-66-0x0000000000000000-mapping.dmp
-
memory/900-59-0x0000000000000000-mapping.dmp
-
memory/1156-54-0x00000000755C1000-0x00000000755C3000-memory.dmpFilesize
8KB
-
memory/1156-55-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/1156-56-0x0000000000020000-0x0000000000024000-memory.dmpFilesize
16KB
-
memory/1156-60-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/1640-64-0x0000000000000000-mapping.dmp
-
memory/1640-70-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/1640-71-0x0000000000020000-0x0000000000024000-memory.dmpFilesize
16KB
-
memory/1640-72-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/1640-75-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/1656-57-0x0000000000000000-mapping.dmp
-
memory/1660-65-0x0000000000000000-mapping.dmp
-
memory/1836-58-0x0000000000000000-mapping.dmp
-
memory/1836-69-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/1836-73-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/1836-74-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB