Analysis
-
max time kernel
149s -
max time network
192s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
07-07-2022 22:31
Static task
static1
Behavioral task
behavioral1
Sample
438f9ed2b694491948810fa0d58203501535c5648b96ae6bc2870f2c83d02553.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
438f9ed2b694491948810fa0d58203501535c5648b96ae6bc2870f2c83d02553.exe
Resource
win10v2004-20220414-en
General
-
Target
438f9ed2b694491948810fa0d58203501535c5648b96ae6bc2870f2c83d02553.exe
-
Size
42KB
-
MD5
2f2a05582e1b8b5a71811c9c68fe3eec
-
SHA1
22e1cedd966a64615fc76a0a5a3653c058766b80
-
SHA256
438f9ed2b694491948810fa0d58203501535c5648b96ae6bc2870f2c83d02553
-
SHA512
2c22e32b72e76770227452a928f5579dbc799e0260bd8f51f983e16a64f950bb4259cdbd491533bcf94d2cadc95421322e009684dcc60fed148c2ff2195ef07f
Malware Config
Signatures
-
suricata: ET MALWARE Possible DEEP PANDA C2 Activity
suricata: ET MALWARE Possible DEEP PANDA C2 Activity
-
suricata: ET MALWARE Possible Deep Panda - Sakula/Mivast RAT CnC Beacon 5
suricata: ET MALWARE Possible Deep Panda - Sakula/Mivast RAT CnC Beacon 5
-
suricata: ET MALWARE Sakula/Mivast C2 Activity
suricata: ET MALWARE Sakula/Mivast C2 Activity
-
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 1992 MediaCenter.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2040 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
cmd.exepid process 1208 cmd.exe 1208 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" reg.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
438f9ed2b694491948810fa0d58203501535c5648b96ae6bc2870f2c83d02553.execmd.execmd.execmd.exedescription pid process target process PID 1524 wrote to memory of 1064 1524 438f9ed2b694491948810fa0d58203501535c5648b96ae6bc2870f2c83d02553.exe cmd.exe PID 1524 wrote to memory of 1064 1524 438f9ed2b694491948810fa0d58203501535c5648b96ae6bc2870f2c83d02553.exe cmd.exe PID 1524 wrote to memory of 1064 1524 438f9ed2b694491948810fa0d58203501535c5648b96ae6bc2870f2c83d02553.exe cmd.exe PID 1524 wrote to memory of 1064 1524 438f9ed2b694491948810fa0d58203501535c5648b96ae6bc2870f2c83d02553.exe cmd.exe PID 1524 wrote to memory of 1208 1524 438f9ed2b694491948810fa0d58203501535c5648b96ae6bc2870f2c83d02553.exe cmd.exe PID 1524 wrote to memory of 1208 1524 438f9ed2b694491948810fa0d58203501535c5648b96ae6bc2870f2c83d02553.exe cmd.exe PID 1524 wrote to memory of 1208 1524 438f9ed2b694491948810fa0d58203501535c5648b96ae6bc2870f2c83d02553.exe cmd.exe PID 1524 wrote to memory of 1208 1524 438f9ed2b694491948810fa0d58203501535c5648b96ae6bc2870f2c83d02553.exe cmd.exe PID 1524 wrote to memory of 2040 1524 438f9ed2b694491948810fa0d58203501535c5648b96ae6bc2870f2c83d02553.exe cmd.exe PID 1524 wrote to memory of 2040 1524 438f9ed2b694491948810fa0d58203501535c5648b96ae6bc2870f2c83d02553.exe cmd.exe PID 1524 wrote to memory of 2040 1524 438f9ed2b694491948810fa0d58203501535c5648b96ae6bc2870f2c83d02553.exe cmd.exe PID 1524 wrote to memory of 2040 1524 438f9ed2b694491948810fa0d58203501535c5648b96ae6bc2870f2c83d02553.exe cmd.exe PID 1208 wrote to memory of 1992 1208 cmd.exe MediaCenter.exe PID 1208 wrote to memory of 1992 1208 cmd.exe MediaCenter.exe PID 1208 wrote to memory of 1992 1208 cmd.exe MediaCenter.exe PID 1208 wrote to memory of 1992 1208 cmd.exe MediaCenter.exe PID 1064 wrote to memory of 1380 1064 cmd.exe reg.exe PID 1064 wrote to memory of 1380 1064 cmd.exe reg.exe PID 1064 wrote to memory of 1380 1064 cmd.exe reg.exe PID 1064 wrote to memory of 1380 1064 cmd.exe reg.exe PID 2040 wrote to memory of 932 2040 cmd.exe PING.EXE PID 2040 wrote to memory of 932 2040 cmd.exe PING.EXE PID 2040 wrote to memory of 932 2040 cmd.exe PING.EXE PID 2040 wrote to memory of 932 2040 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\438f9ed2b694491948810fa0d58203501535c5648b96ae6bc2870f2c83d02553.exe"C:\Users\Admin\AppData\Local\Temp\438f9ed2b694491948810fa0d58203501535c5648b96ae6bc2870f2c83d02553.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\SysWOW64\cmd.execmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v "MicroMedia" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v "MicroMedia" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"3⤵
- Adds Run key to start application
- Modifies registry key
PID:1380 -
C:\Windows\SysWOW64\cmd.execmd.exe /c "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe3⤵
- Executes dropped EXE
PID:1992 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ping 127.0.0.1 & del "C:\Users\Admin\AppData\Local\Temp\438f9ed2b694491948810fa0d58203501535c5648b96ae6bc2870f2c83d02553.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:932
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD54fc6f86c8e5cb0c12927f68233452b83
SHA1281a10a62213c948fa383441d56a5fdae38fadd9
SHA2561d172d124b85716c8f3a277bd741ae92a30308b1f69eeffbfd6314efdd3aaa16
SHA512d5da1acdbed1d6444d743cefbde9f410e133a3ba25b5001a5dce75a9e46e468f55bb3bc4cff83ee2b7f7488cf4e1e4663888be33a02ee1b2820a237f4c59b337
-
Filesize
42KB
MD54fc6f86c8e5cb0c12927f68233452b83
SHA1281a10a62213c948fa383441d56a5fdae38fadd9
SHA2561d172d124b85716c8f3a277bd741ae92a30308b1f69eeffbfd6314efdd3aaa16
SHA512d5da1acdbed1d6444d743cefbde9f410e133a3ba25b5001a5dce75a9e46e468f55bb3bc4cff83ee2b7f7488cf4e1e4663888be33a02ee1b2820a237f4c59b337
-
Filesize
42KB
MD54fc6f86c8e5cb0c12927f68233452b83
SHA1281a10a62213c948fa383441d56a5fdae38fadd9
SHA2561d172d124b85716c8f3a277bd741ae92a30308b1f69eeffbfd6314efdd3aaa16
SHA512d5da1acdbed1d6444d743cefbde9f410e133a3ba25b5001a5dce75a9e46e468f55bb3bc4cff83ee2b7f7488cf4e1e4663888be33a02ee1b2820a237f4c59b337
-
Filesize
42KB
MD54fc6f86c8e5cb0c12927f68233452b83
SHA1281a10a62213c948fa383441d56a5fdae38fadd9
SHA2561d172d124b85716c8f3a277bd741ae92a30308b1f69eeffbfd6314efdd3aaa16
SHA512d5da1acdbed1d6444d743cefbde9f410e133a3ba25b5001a5dce75a9e46e468f55bb3bc4cff83ee2b7f7488cf4e1e4663888be33a02ee1b2820a237f4c59b337