Analysis
-
max time kernel
138s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
26-06-2022 02:23
Static task
static1
Behavioral task
behavioral1
Sample
367d0147ad21a3d5596aebe5bc8607e84d2af8c55373d2e9d376dcd3343804e1.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
367d0147ad21a3d5596aebe5bc8607e84d2af8c55373d2e9d376dcd3343804e1.exe
Resource
win10v2004-20220414-en
General
-
Target
367d0147ad21a3d5596aebe5bc8607e84d2af8c55373d2e9d376dcd3343804e1.exe
-
Size
19KB
-
MD5
7eae7b067a47a76d1b4791ab0c5c70c0
-
SHA1
04ec3f9663ee24293d15c9b8cbf880cb4142a2cf
-
SHA256
367d0147ad21a3d5596aebe5bc8607e84d2af8c55373d2e9d376dcd3343804e1
-
SHA512
3c99c677d6618a84a31bc6909f0bf85fab4e560cfbc23ae57a1cd806ef7003fa4d32049736162da62d75f266c1373917157a66a1e356683526f97aaf97eb4679
Malware Config
Signatures
-
suricata: ET MALWARE Possible DEEP PANDA C2 Activity
suricata: ET MALWARE Possible DEEP PANDA C2 Activity
-
suricata: ET MALWARE Possible Deep Panda - Sakula/Mivast RAT CnC Beacon 5
suricata: ET MALWARE Possible Deep Panda - Sakula/Mivast RAT CnC Beacon 5
-
suricata: ET MALWARE Sakula/Mivast C2 Activity
suricata: ET MALWARE Sakula/Mivast C2 Activity
-
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 1288 MediaCenter.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 836 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
cmd.exepid process 652 cmd.exe 652 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" reg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run reg.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
367d0147ad21a3d5596aebe5bc8607e84d2af8c55373d2e9d376dcd3343804e1.execmd.execmd.execmd.exedescription pid process target process PID 1660 wrote to memory of 2024 1660 367d0147ad21a3d5596aebe5bc8607e84d2af8c55373d2e9d376dcd3343804e1.exe cmd.exe PID 1660 wrote to memory of 2024 1660 367d0147ad21a3d5596aebe5bc8607e84d2af8c55373d2e9d376dcd3343804e1.exe cmd.exe PID 1660 wrote to memory of 2024 1660 367d0147ad21a3d5596aebe5bc8607e84d2af8c55373d2e9d376dcd3343804e1.exe cmd.exe PID 1660 wrote to memory of 2024 1660 367d0147ad21a3d5596aebe5bc8607e84d2af8c55373d2e9d376dcd3343804e1.exe cmd.exe PID 1660 wrote to memory of 652 1660 367d0147ad21a3d5596aebe5bc8607e84d2af8c55373d2e9d376dcd3343804e1.exe cmd.exe PID 1660 wrote to memory of 652 1660 367d0147ad21a3d5596aebe5bc8607e84d2af8c55373d2e9d376dcd3343804e1.exe cmd.exe PID 1660 wrote to memory of 652 1660 367d0147ad21a3d5596aebe5bc8607e84d2af8c55373d2e9d376dcd3343804e1.exe cmd.exe PID 1660 wrote to memory of 652 1660 367d0147ad21a3d5596aebe5bc8607e84d2af8c55373d2e9d376dcd3343804e1.exe cmd.exe PID 1660 wrote to memory of 836 1660 367d0147ad21a3d5596aebe5bc8607e84d2af8c55373d2e9d376dcd3343804e1.exe cmd.exe PID 1660 wrote to memory of 836 1660 367d0147ad21a3d5596aebe5bc8607e84d2af8c55373d2e9d376dcd3343804e1.exe cmd.exe PID 1660 wrote to memory of 836 1660 367d0147ad21a3d5596aebe5bc8607e84d2af8c55373d2e9d376dcd3343804e1.exe cmd.exe PID 1660 wrote to memory of 836 1660 367d0147ad21a3d5596aebe5bc8607e84d2af8c55373d2e9d376dcd3343804e1.exe cmd.exe PID 652 wrote to memory of 1288 652 cmd.exe MediaCenter.exe PID 652 wrote to memory of 1288 652 cmd.exe MediaCenter.exe PID 652 wrote to memory of 1288 652 cmd.exe MediaCenter.exe PID 652 wrote to memory of 1288 652 cmd.exe MediaCenter.exe PID 2024 wrote to memory of 1284 2024 cmd.exe reg.exe PID 2024 wrote to memory of 1284 2024 cmd.exe reg.exe PID 2024 wrote to memory of 1284 2024 cmd.exe reg.exe PID 2024 wrote to memory of 1284 2024 cmd.exe reg.exe PID 836 wrote to memory of 1260 836 cmd.exe PING.EXE PID 836 wrote to memory of 1260 836 cmd.exe PING.EXE PID 836 wrote to memory of 1260 836 cmd.exe PING.EXE PID 836 wrote to memory of 1260 836 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\367d0147ad21a3d5596aebe5bc8607e84d2af8c55373d2e9d376dcd3343804e1.exe"C:\Users\Admin\AppData\Local\Temp\367d0147ad21a3d5596aebe5bc8607e84d2af8c55373d2e9d376dcd3343804e1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\cmd.execmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v "MicroMedia" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v "MicroMedia" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"3⤵
- Adds Run key to start application
- Modifies registry key
PID:1284 -
C:\Windows\SysWOW64\cmd.execmd.exe /c "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe3⤵
- Executes dropped EXE
PID:1288 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ping 127.0.0.1 & del "C:\Users\Admin\AppData\Local\Temp\367d0147ad21a3d5596aebe5bc8607e84d2af8c55373d2e9d376dcd3343804e1.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1260
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD5f6db9df000bf0e44059b0b30e9c831eb
SHA174325e35d805ca7b2614eb3a1b322961b404c92d
SHA2566d5b20d692769764b174696e0109ed17ca72c6db5166fbc1c840c1348e0defb1
SHA5129b111c5438e11fe7cec222cf96ebdfe322773a5db5f6394eaaba7674791e4a14da3c0b7766c50c5a93e83c88c677ef6b8cedcc685e49c91afda846c1d641d1d8
-
Filesize
19KB
MD5f6db9df000bf0e44059b0b30e9c831eb
SHA174325e35d805ca7b2614eb3a1b322961b404c92d
SHA2566d5b20d692769764b174696e0109ed17ca72c6db5166fbc1c840c1348e0defb1
SHA5129b111c5438e11fe7cec222cf96ebdfe322773a5db5f6394eaaba7674791e4a14da3c0b7766c50c5a93e83c88c677ef6b8cedcc685e49c91afda846c1d641d1d8
-
Filesize
19KB
MD5f6db9df000bf0e44059b0b30e9c831eb
SHA174325e35d805ca7b2614eb3a1b322961b404c92d
SHA2566d5b20d692769764b174696e0109ed17ca72c6db5166fbc1c840c1348e0defb1
SHA5129b111c5438e11fe7cec222cf96ebdfe322773a5db5f6394eaaba7674791e4a14da3c0b7766c50c5a93e83c88c677ef6b8cedcc685e49c91afda846c1d641d1d8
-
Filesize
19KB
MD5f6db9df000bf0e44059b0b30e9c831eb
SHA174325e35d805ca7b2614eb3a1b322961b404c92d
SHA2566d5b20d692769764b174696e0109ed17ca72c6db5166fbc1c840c1348e0defb1
SHA5129b111c5438e11fe7cec222cf96ebdfe322773a5db5f6394eaaba7674791e4a14da3c0b7766c50c5a93e83c88c677ef6b8cedcc685e49c91afda846c1d641d1d8