Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231130-en -
resource tags
arch:x64arch:x86image:win7-20231130-enlocale:en-usos:windows7-x64system -
submitted
13-12-2023 16:32
Static task
static1
Behavioral task
behavioral1
Sample
d4be6c9117db9de21138ae26d1d0c3cfb38fd7a19fa07c828731fa2ac756ef8d.exe
Resource
win7-20231130-en
Behavioral task
behavioral2
Sample
d4be6c9117db9de21138ae26d1d0c3cfb38fd7a19fa07c828731fa2ac756ef8d.exe
Resource
win10v2004-20231130-en
General
-
Target
d4be6c9117db9de21138ae26d1d0c3cfb38fd7a19fa07c828731fa2ac756ef8d.exe
-
Size
438KB
-
MD5
230d8a7a60a07df28a291b13ddf3351f
-
SHA1
de71fd21781ae1eed0dbba6bf915a65cc4c0f984
-
SHA256
d4be6c9117db9de21138ae26d1d0c3cfb38fd7a19fa07c828731fa2ac756ef8d
-
SHA512
b3305950a8d24b247a16b35d49f53dfbc367332879ddafcb7d95a1c44ec02f7ed66d26acbf9992bf39193094c7bbefcbbe59ae514619491e148bb59cb32ddf01
-
SSDEEP
6144:Ldgv30si81H+Uyc4WLrxBcQtz8Q0bDC3zUonh8CD2Kc+hO:W71HTyc4WnxBF8Q02UonhsF+hO
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
Center259394734.dats.exeMediaCenter.exepid process 1812 Center259394734.dat 3056 s.exe 2976 MediaCenter.exe -
Loads dropped DLL 6 IoCs
Processes:
d4be6c9117db9de21138ae26d1d0c3cfb38fd7a19fa07c828731fa2ac756ef8d.exeCenter259394734.dats.execmd.exeMediaCenter.exepid process 856 d4be6c9117db9de21138ae26d1d0c3cfb38fd7a19fa07c828731fa2ac756ef8d.exe 856 d4be6c9117db9de21138ae26d1d0c3cfb38fd7a19fa07c828731fa2ac756ef8d.exe 1812 Center259394734.dat 3056 s.exe 2524 cmd.exe 2976 MediaCenter.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
MediaCenter.exedescription pid process target process PID 2976 set thread context of 2560 2976 MediaCenter.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006ada02fffb05344dbbebb32fd2687d5f00000000020000000000106600000001000020000000835222ce70eaff4f347e702e95a23abe84d5046efe61848f469f6fa036df98e7000000000e8000000002000020000000d215334e96b49309b39b7b3d748284cf3511519758369e8d33a3f511936aa429200000007481a7990c52124c092cbe0c360789c30a799f91061c61e946b309ccb5476678400000007457bfa8cf979c670a94a71c78ac022902ccc77540a0e788086a8c44f21b9d302e167673c9cfdd2b16a7d2e0e8d3ebcbf8d437825676200ab028ef6fcd5fb3d8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90ec742ce22dda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "408647073" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4993D931-99D5-11EE-BF5A-D27DC150AB5B} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Runs ping.exe 1 TTPs 2 IoCs
-
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2960 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
d4be6c9117db9de21138ae26d1d0c3cfb38fd7a19fa07c828731fa2ac756ef8d.exeiexplore.exeIEXPLORE.EXEpid process 856 d4be6c9117db9de21138ae26d1d0c3cfb38fd7a19fa07c828731fa2ac756ef8d.exe 856 d4be6c9117db9de21138ae26d1d0c3cfb38fd7a19fa07c828731fa2ac756ef8d.exe 2960 iexplore.exe 2960 iexplore.exe 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 59 IoCs
Processes:
d4be6c9117db9de21138ae26d1d0c3cfb38fd7a19fa07c828731fa2ac756ef8d.exeCenter259394734.dats.execmd.execmd.execmd.execmd.exeMediaCenter.exeiexplore.exedescription pid process target process PID 856 wrote to memory of 1812 856 d4be6c9117db9de21138ae26d1d0c3cfb38fd7a19fa07c828731fa2ac756ef8d.exe Center259394734.dat PID 856 wrote to memory of 1812 856 d4be6c9117db9de21138ae26d1d0c3cfb38fd7a19fa07c828731fa2ac756ef8d.exe Center259394734.dat PID 856 wrote to memory of 1812 856 d4be6c9117db9de21138ae26d1d0c3cfb38fd7a19fa07c828731fa2ac756ef8d.exe Center259394734.dat PID 856 wrote to memory of 1812 856 d4be6c9117db9de21138ae26d1d0c3cfb38fd7a19fa07c828731fa2ac756ef8d.exe Center259394734.dat PID 1812 wrote to memory of 3056 1812 Center259394734.dat s.exe PID 1812 wrote to memory of 3056 1812 Center259394734.dat s.exe PID 1812 wrote to memory of 3056 1812 Center259394734.dat s.exe PID 1812 wrote to memory of 3056 1812 Center259394734.dat s.exe PID 1812 wrote to memory of 3056 1812 Center259394734.dat s.exe PID 1812 wrote to memory of 3056 1812 Center259394734.dat s.exe PID 1812 wrote to memory of 3056 1812 Center259394734.dat s.exe PID 1812 wrote to memory of 2480 1812 Center259394734.dat cmd.exe PID 1812 wrote to memory of 2480 1812 Center259394734.dat cmd.exe PID 1812 wrote to memory of 2480 1812 Center259394734.dat cmd.exe PID 1812 wrote to memory of 2480 1812 Center259394734.dat cmd.exe PID 3056 wrote to memory of 2500 3056 s.exe cmd.exe PID 3056 wrote to memory of 2500 3056 s.exe cmd.exe PID 3056 wrote to memory of 2500 3056 s.exe cmd.exe PID 3056 wrote to memory of 2500 3056 s.exe cmd.exe PID 3056 wrote to memory of 2524 3056 s.exe cmd.exe PID 3056 wrote to memory of 2524 3056 s.exe cmd.exe PID 3056 wrote to memory of 2524 3056 s.exe cmd.exe PID 3056 wrote to memory of 2524 3056 s.exe cmd.exe PID 3056 wrote to memory of 2552 3056 s.exe cmd.exe PID 3056 wrote to memory of 2552 3056 s.exe cmd.exe PID 3056 wrote to memory of 2552 3056 s.exe cmd.exe PID 3056 wrote to memory of 2552 3056 s.exe cmd.exe PID 2480 wrote to memory of 2784 2480 cmd.exe PING.EXE PID 2480 wrote to memory of 2784 2480 cmd.exe PING.EXE PID 2480 wrote to memory of 2784 2480 cmd.exe PING.EXE PID 2480 wrote to memory of 2784 2480 cmd.exe PING.EXE PID 2552 wrote to memory of 2404 2552 cmd.exe PING.EXE PID 2552 wrote to memory of 2404 2552 cmd.exe PING.EXE PID 2552 wrote to memory of 2404 2552 cmd.exe PING.EXE PID 2552 wrote to memory of 2404 2552 cmd.exe PING.EXE PID 2524 wrote to memory of 2976 2524 cmd.exe MediaCenter.exe PID 2524 wrote to memory of 2976 2524 cmd.exe MediaCenter.exe PID 2524 wrote to memory of 2976 2524 cmd.exe MediaCenter.exe PID 2524 wrote to memory of 2976 2524 cmd.exe MediaCenter.exe PID 2524 wrote to memory of 2976 2524 cmd.exe MediaCenter.exe PID 2524 wrote to memory of 2976 2524 cmd.exe MediaCenter.exe PID 2524 wrote to memory of 2976 2524 cmd.exe MediaCenter.exe PID 2500 wrote to memory of 2696 2500 cmd.exe reg.exe PID 2500 wrote to memory of 2696 2500 cmd.exe reg.exe PID 2500 wrote to memory of 2696 2500 cmd.exe reg.exe PID 2500 wrote to memory of 2696 2500 cmd.exe reg.exe PID 2976 wrote to memory of 2560 2976 MediaCenter.exe svchost.exe PID 2976 wrote to memory of 2560 2976 MediaCenter.exe svchost.exe PID 2976 wrote to memory of 2560 2976 MediaCenter.exe svchost.exe PID 2976 wrote to memory of 2560 2976 MediaCenter.exe svchost.exe PID 2976 wrote to memory of 2560 2976 MediaCenter.exe svchost.exe PID 856 wrote to memory of 2960 856 d4be6c9117db9de21138ae26d1d0c3cfb38fd7a19fa07c828731fa2ac756ef8d.exe iexplore.exe PID 856 wrote to memory of 2960 856 d4be6c9117db9de21138ae26d1d0c3cfb38fd7a19fa07c828731fa2ac756ef8d.exe iexplore.exe PID 856 wrote to memory of 2960 856 d4be6c9117db9de21138ae26d1d0c3cfb38fd7a19fa07c828731fa2ac756ef8d.exe iexplore.exe PID 856 wrote to memory of 2960 856 d4be6c9117db9de21138ae26d1d0c3cfb38fd7a19fa07c828731fa2ac756ef8d.exe iexplore.exe PID 2960 wrote to memory of 2732 2960 iexplore.exe IEXPLORE.EXE PID 2960 wrote to memory of 2732 2960 iexplore.exe IEXPLORE.EXE PID 2960 wrote to memory of 2732 2960 iexplore.exe IEXPLORE.EXE PID 2960 wrote to memory of 2732 2960 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4be6c9117db9de21138ae26d1d0c3cfb38fd7a19fa07c828731fa2ac756ef8d.exe"C:\Users\Admin\AppData\Local\Temp\d4be6c9117db9de21138ae26d1d0c3cfb38fd7a19fa07c828731fa2ac756ef8d.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Users\Admin\AppData\Local\Temp\Center259394734.dat"C:\Users\Admin\AppData\Local\Temp\Center259394734.dat"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\s.exe"C:\Users\Admin\AppData\Local\Temp\s.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\cmd.execmd.exe /c "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"6⤵PID:2560
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ping 127.0.0.1 & del "C:\Users\Admin\AppData\Local\Temp\s.exe" & del "C:\Users\Admin\AppData\Local\Temp\msi.dll" & del "C:\Users\Admin\AppData\Local\Temp\setup.msi"4⤵
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.15⤵
- Runs ping.exe
PID:2404 -
C:\Windows\SysWOW64\cmd.execmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v "MicroMedia" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\SysWOW64\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v "MicroMedia" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe"5⤵
- Adds Run key to start application
- Modifies registry key
PID:2696 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\Center259394734.dat"3⤵
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.14⤵
- Runs ping.exe
PID:2784 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://sharepoint-vaeit.com/login.php?ref2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2960 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\msi.dllFilesize
2KB
MD5ca9e06c0679586d2ff3ff7e3416c8b87
SHA123d450989ce21cb94c0f9e552edd5eeb50b20fb3
SHA256f414bcb7159a22279f893a257b52e387e4b14250dd9d0ecd871d9fa686cd26cd
SHA51298a2c588a1b408f78e286540752121ac34e81963d559a8e00faa44b9a65ca2cb7265c0598aea57947d799604717cc2004fc6261e8e377a6ba6416421b44dda6e
-
C:\Users\Admin\AppData\Local\Temp\setup.msiFilesize
29KB
MD52c531fe9c05c5644f09fdbcbf993a737
SHA13c1185e2411549cc976cecc350f357a77de249eb
SHA256680903d29590607a1ac4b77bb4cc900b382949800a1f49ebfa04b2492319118f
SHA512859fa0f8efe37c196fe7bb43627c16129657dcf5ff96d23cd72c7770f564525c9b0c95ae68f0e7dad99ccf6bc97dbd5cdc4b3fb38c5fd3129a6308e3b01d7094
-
\Users\Admin\AppData\Local\Temp\Center259394734.datFilesize
69KB
MD5a0de79c3b449175aa97725e16c7e74b4
SHA11c57f8cb0fb4eb944634ae1e784bbf51c181a97a
SHA2562102dd512f557bcd74d243c0354b9f58ced6036fc6a9be2620377890eec2348c
SHA512d1a72cd238becabd9d0ab99cedddf22fbcdb6f410573995cd9f9c79efb68527d269e5f1331eee7905ee68af87be1dc1bd5b96769ac5b7ea30561cc84478a6e01
-
\Users\Admin\AppData\Local\Temp\s.exeFilesize
33KB
MD5d00b3169f45e74bb22a1cd684341b14a
SHA12d8e43f9f8ef6cdf0cafb170a65cb27d37fb166d
SHA25683f40e70ea3ba0e614d08f1070dafe75092660003b8a1f8b563d4f5b012f4bae
SHA512329438b4e6d13f9a420152e5c4ed410ae474d47cad858f218bfc8130a73d8d684d89c032cf87f74b9dc3e027bcb9fbe74fe2d4f15f4a59942c4da59b7099997e
-
memory/2560-39-0x0000000000080000-0x0000000000088000-memory.dmpFilesize
32KB
-
memory/2560-42-0x0000000010000000-0x000000001000A000-memory.dmpFilesize
40KB
-
memory/2560-41-0x0000000000080000-0x0000000000088000-memory.dmpFilesize
32KB
-
memory/3056-20-0x0000000000240000-0x0000000000248000-memory.dmpFilesize
32KB
-
memory/3056-21-0x0000000000250000-0x000000000025A000-memory.dmpFilesize
40KB
-
memory/3056-26-0x0000000000240000-0x0000000000248000-memory.dmpFilesize
32KB
-
memory/3056-45-0x0000000000240000-0x0000000000248000-memory.dmpFilesize
32KB