Analysis
-
max time kernel
36s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06-09-2022 21:35
Behavioral task
behavioral1
Sample
b94c34b47ff7bb61ad8b70f18de510c7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b94c34b47ff7bb61ad8b70f18de510c7.exe
Resource
win10v2004-20220901-en
General
-
Target
b94c34b47ff7bb61ad8b70f18de510c7.exe
-
Size
43KB
-
MD5
b94c34b47ff7bb61ad8b70f18de510c7
-
SHA1
152ba262535deb241a9dbdc004c69a1564ff7803
-
SHA256
6cb97cb356491c601fe9b104bdeeb12351741ab13c77ce335bbb5c4981d13323
-
SHA512
ebfe6ce357802b8a158046144fea2532fceaa0188aceba1be49af365bd93f17ba6a07a7f8ba766a15f9d817832b815d9724509a8cdc67fe9085bb5d31f544dcc
-
SSDEEP
384:MnyhSksAVndb4G3w2NMsG9OqvhyY3Q6oVxYwwsRhg7+iXXRodY6kLdAeMs:1hSksandb4GgyMsp4hyYtoVxYdT7ZXqE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
MediaCenter.exepid process 812 MediaCenter.exe -
Processes:
resource yara_rule behavioral1/memory/1928-55-0x0000000000400000-0x000000000040D000-memory.dmp upx behavioral1/memory/1928-56-0x0000000000400000-0x000000000040D000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe upx \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe upx \Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe upx C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe upx behavioral1/memory/812-70-0x0000000000400000-0x000000000040D000-memory.dmp upx -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1136 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
cmd.exepid process 1316 cmd.exe 1316 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" reg.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
b94c34b47ff7bb61ad8b70f18de510c7.execmd.execmd.execmd.exedescription pid process target process PID 1928 wrote to memory of 1172 1928 b94c34b47ff7bb61ad8b70f18de510c7.exe cmd.exe PID 1928 wrote to memory of 1172 1928 b94c34b47ff7bb61ad8b70f18de510c7.exe cmd.exe PID 1928 wrote to memory of 1172 1928 b94c34b47ff7bb61ad8b70f18de510c7.exe cmd.exe PID 1928 wrote to memory of 1172 1928 b94c34b47ff7bb61ad8b70f18de510c7.exe cmd.exe PID 1928 wrote to memory of 1316 1928 b94c34b47ff7bb61ad8b70f18de510c7.exe cmd.exe PID 1928 wrote to memory of 1316 1928 b94c34b47ff7bb61ad8b70f18de510c7.exe cmd.exe PID 1928 wrote to memory of 1316 1928 b94c34b47ff7bb61ad8b70f18de510c7.exe cmd.exe PID 1928 wrote to memory of 1316 1928 b94c34b47ff7bb61ad8b70f18de510c7.exe cmd.exe PID 1928 wrote to memory of 1136 1928 b94c34b47ff7bb61ad8b70f18de510c7.exe cmd.exe PID 1928 wrote to memory of 1136 1928 b94c34b47ff7bb61ad8b70f18de510c7.exe cmd.exe PID 1928 wrote to memory of 1136 1928 b94c34b47ff7bb61ad8b70f18de510c7.exe cmd.exe PID 1928 wrote to memory of 1136 1928 b94c34b47ff7bb61ad8b70f18de510c7.exe cmd.exe PID 1316 wrote to memory of 812 1316 cmd.exe MediaCenter.exe PID 1316 wrote to memory of 812 1316 cmd.exe MediaCenter.exe PID 1316 wrote to memory of 812 1316 cmd.exe MediaCenter.exe PID 1316 wrote to memory of 812 1316 cmd.exe MediaCenter.exe PID 1136 wrote to memory of 2028 1136 cmd.exe PING.EXE PID 1136 wrote to memory of 2028 1136 cmd.exe PING.EXE PID 1136 wrote to memory of 2028 1136 cmd.exe PING.EXE PID 1136 wrote to memory of 2028 1136 cmd.exe PING.EXE PID 1172 wrote to memory of 1148 1172 cmd.exe reg.exe PID 1172 wrote to memory of 1148 1172 cmd.exe reg.exe PID 1172 wrote to memory of 1148 1172 cmd.exe reg.exe PID 1172 wrote to memory of 1148 1172 cmd.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b94c34b47ff7bb61ad8b70f18de510c7.exe"C:\Users\Admin\AppData\Local\Temp\b94c34b47ff7bb61ad8b70f18de510c7.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\cmd.execmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v "MicroMedia" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\SysWOW64\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v "MicroMedia" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"3⤵
- Adds Run key to start application
- Modifies registry key
PID:1148 -
C:\Windows\SysWOW64\cmd.execmd.exe /c "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe3⤵
- Executes dropped EXE
PID:812 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ping 127.0.0.1 & del "C:\Users\Admin\AppData\Local\Temp\b94c34b47ff7bb61ad8b70f18de510c7.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:2028
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD5b1e367b777f6882bae549f5ea05808bd
SHA1189a8b701613fc666aeac735f9aae2f90e349557
SHA256923e19006557b4c7e2a0a070ab85cbeff30c1116f25b83f05927919d527e1935
SHA5128cf1b5ce7f7e94094ac72cc7a122c3ea25a9db54c627413a46c51fd678c21c7fa33d2fa91309aad64e8fab105d92329f364489f7fa1f8196be6ce48df5296a61
-
Filesize
43KB
MD5b1e367b777f6882bae549f5ea05808bd
SHA1189a8b701613fc666aeac735f9aae2f90e349557
SHA256923e19006557b4c7e2a0a070ab85cbeff30c1116f25b83f05927919d527e1935
SHA5128cf1b5ce7f7e94094ac72cc7a122c3ea25a9db54c627413a46c51fd678c21c7fa33d2fa91309aad64e8fab105d92329f364489f7fa1f8196be6ce48df5296a61
-
Filesize
43KB
MD5b1e367b777f6882bae549f5ea05808bd
SHA1189a8b701613fc666aeac735f9aae2f90e349557
SHA256923e19006557b4c7e2a0a070ab85cbeff30c1116f25b83f05927919d527e1935
SHA5128cf1b5ce7f7e94094ac72cc7a122c3ea25a9db54c627413a46c51fd678c21c7fa33d2fa91309aad64e8fab105d92329f364489f7fa1f8196be6ce48df5296a61
-
Filesize
43KB
MD5b1e367b777f6882bae549f5ea05808bd
SHA1189a8b701613fc666aeac735f9aae2f90e349557
SHA256923e19006557b4c7e2a0a070ab85cbeff30c1116f25b83f05927919d527e1935
SHA5128cf1b5ce7f7e94094ac72cc7a122c3ea25a9db54c627413a46c51fd678c21c7fa33d2fa91309aad64e8fab105d92329f364489f7fa1f8196be6ce48df5296a61