Analysis

  • max time kernel
    298s
  • max time network
    229s
  • platform
    windows7_x64
  • resource
    win7-20230220-es
  • resource tags

    arch:x64arch:x86image:win7-20230220-eslocale:es-esos:windows7-x64systemwindows
  • submitted
    23-03-2023 08:19

General

  • Target

    MEMZ 3.0/MEMZ.exe

  • Size

    12KB

  • MD5

    a7bcf7ea8e9f3f36ebfb85b823e39d91

  • SHA1

    761168201520c199dba68add3a607922d8d4a86e

  • SHA256

    3ff64f10603f0330fa2386ff99471ca789391ace969bd0ec1c1b8ce1b4a6db42

  • SHA512

    89923b669d31e590189fd06619bf27e47c5a47e82be6ae71fdb1b9b3b30b06fb7ca8ffed6d5c41ac410a367f2eb07589291e95a2644877d6bffd52775a5b1523

  • SSDEEP

    192:HMDLTxWDf/pl3cIEiwqZKBktLe3P+qf2jhP6B5b2yL3:H4IDH3cIqqvUWq+jhyT2yL

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\MEMZ 3.0\MEMZ.exe
    "C:\Users\Admin\AppData\Local\Temp\MEMZ 3.0\MEMZ.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:932
    • C:\Users\Admin\AppData\Local\Temp\MEMZ 3.0\MEMZ.exe
      "C:\Users\Admin\AppData\Local\Temp\MEMZ 3.0\MEMZ.exe" /watchdog
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1588
    • C:\Users\Admin\AppData\Local\Temp\MEMZ 3.0\MEMZ.exe
      "C:\Users\Admin\AppData\Local\Temp\MEMZ 3.0\MEMZ.exe" /watchdog
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:508
    • C:\Users\Admin\AppData\Local\Temp\MEMZ 3.0\MEMZ.exe
      "C:\Users\Admin\AppData\Local\Temp\MEMZ 3.0\MEMZ.exe" /watchdog
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1492
    • C:\Users\Admin\AppData\Local\Temp\MEMZ 3.0\MEMZ.exe
      "C:\Users\Admin\AppData\Local\Temp\MEMZ 3.0\MEMZ.exe" /watchdog
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:828
    • C:\Users\Admin\AppData\Local\Temp\MEMZ 3.0\MEMZ.exe
      "C:\Users\Admin\AppData\Local\Temp\MEMZ 3.0\MEMZ.exe" /watchdog
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:624
    • C:\Users\Admin\AppData\Local\Temp\MEMZ 3.0\MEMZ.exe
      "C:\Users\Admin\AppData\Local\Temp\MEMZ 3.0\MEMZ.exe" /main
      2⤵
      • Writes to the Master Boot Record (MBR)
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1344
      • C:\Windows\SysWOW64\notepad.exe
        "C:\Windows\System32\notepad.exe" \note.txt
        3⤵
          PID:584
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" https://google.co.ck/search?q=how+to+create+your+own+ransomware
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:872
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:872 CREDAT:275457 /prefetch:2
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1624
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x528
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:824

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Bootkit

    1
    T1067

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      61KB

      MD5

      e71c8443ae0bc2e282c73faead0a6dd3

      SHA1

      0c110c1b01e68edfacaeae64781a37b1995fa94b

      SHA256

      95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

      SHA512

      b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      3af6cd90036f7948a7a5ce725a0d8a49

      SHA1

      8f83e4973ed0af13d7dbd60e147d515609b6755c

      SHA256

      88221032b37f2507002dc6e91d0e3186f40f4d0a31b9046fb0181ac0a5cd63da

      SHA512

      0b986cc7130711c84de6e816a2104c11d0d1bdfcb05c8af832213d35e043c50821739b21fcaac308d671122527d8e2887ea13dab254818825a9839875f6455d7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      0447d5e8f1fc6f07bd95101a1a100ef6

      SHA1

      c213dfe6ca2942841ec1573c9a2cc4999796a4fb

      SHA256

      a5f16f982b2c0adf0192628f1f0c6e2b375799743f6a95a9f40c9cf3d4d7c547

      SHA512

      4c0003881087cfc2aecf20d8c705c79bd437b814a287bf022158e214a0a4870dd3c4fca8623bc486b5da631a705823cfde1ffa0a7257a17f4d3b470ff67fd421

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      12c9a3d8774e69a603ebfc3c3f7e019a

      SHA1

      860fb14927fac77158c214970b11f47e20f4178f

      SHA256

      99f7847c05fa7848802ff8e6b1795bbc1066d474adc20249c0974d8265ecab6d

      SHA512

      73ddcc39ea43f7748e6c3153ea6e465c4166db96676b9f06f302ee2215b36ad05706dfaa1d5bb4c5a3f56bd1439260d74d9c0608effa3e4043991d50ec60cd28

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      bccaa3f7d1061f67bded18827aa0d854

      SHA1

      75f4cad9b2d82e48dd46635ab25bfca5582c704a

      SHA256

      e7f7d22f0314cb530f5b54657deec415d4bc468752944779f577ddcb3ca33e25

      SHA512

      f6327d00a9094d29fca8b05459016eb7cc2937777117fb3a0a98d61ff3396a3998697ca2de8e09c607083335c24c516194d12659d695eda3525158dae3fbf46a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      b971cbe63727c56855f619661f7f7e56

      SHA1

      fa0de0bb8ae3b1a9246ba5377dceb5033a2709ee

      SHA256

      3d7d860125b68f2c3ee6098a541862de6705d8652a2380995d9b1b567db7d7ec

      SHA512

      c76a9fcf1ab0192888be87e77b2d33fdcde7db3eca2d607330389d34e3600b2c87337b1c4f2cd00ff1db3522a2bffa0272b54343078445b500b6f143886c8e0a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      6285d35c37d24214950676ace577c0c4

      SHA1

      da8920c7887ded9180d94323e326dde87c77f615

      SHA256

      43c36b7adb4fd252dc90a69a80127aa44ad43c6c9c1866a0f6ab5ff0d1b8b74e

      SHA512

      562afc70c871ff03221c26670af9c17c7462a023a27a4d6fb13219892434aaef1c0b705ebc001764f494e16130c7e1e1c3229efd5e9c512ce8e7ce8d829a0662

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      c8a026176495071cfe2d7043a117b86c

      SHA1

      e01cac24597c0736bc068deceafad0f3400167f4

      SHA256

      4af4a4c0b5c1276f9b2e6fdbcd83e3fce5145598961f5af5a08b6b760e0a143c

      SHA512

      ec8930b4bae9925dd2021b8d1203e18921338961a488b94222916c389a2fb1bb5d5c7fb443249658ef1f7ff3e69ef409e7cfac70d69980c6cf30032e81c14ae7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      79afdd22717a1f4fe9de5a15a6c3e908

      SHA1

      897bc7c0a436c85468876aad77b1cd837a7575cf

      SHA256

      8683f990358eb8d506598524f307ac7534068c7e1d93abe30a23ebce209c81cb

      SHA512

      560fffdde0c29d3d3e10daa51e60665e9d54dc56421309aa2e8504aeaf8cc7148e1c40dd5ed6c08b696958a0b98f6ad58dbf07b5c758f63788d72716547a637a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      0608df50d5e975fe81f30cbcfd86a5ba

      SHA1

      38181c4303f611bb4846a9b980dfa37271d677a7

      SHA256

      6c8b631f43a1d2ef483e73b872fe232b6d3c034385fd6ffd66d68dee7c9b7e61

      SHA512

      5cae0c5686c849ff9c0ae14ac50132017c08048b848f8c7885b776dc5af7899822651cebcd53bbac91be279974c96103992dbf80ab9ae2d4889847409c21c49b

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\62yy7f8\imagestore.dat
      Filesize

      9KB

      MD5

      3e8131d48a8e13e7fc7488f03e608aba

      SHA1

      4f0bee484c48883e22516b14e2748af510b5e4c9

      SHA256

      fda89df1074e9642a5b5965bd190921c117b344f15a339a1141f992eacc1f931

      SHA512

      5e89be066361404d0f26774f3fc25fbbd74d77737d35d3fd2f5e58b7c362840b4903e9f04378e89cafbb09e22da2f6bef819cacefae750e0de5725d31f016e5b

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BJWXLGAS\suggestions[1].es-ES
      Filesize

      18KB

      MD5

      e2749896090665aeb9b29bce1a591a75

      SHA1

      59e05283e04c6c0252d2b75d5141ba62d73e9df9

      SHA256

      d428ea8ca335c7cccf1e1564554d81b52fb5a1f20617aa99136cacf73354e0b7

      SHA512

      c750e9ccb30c45e2c4844df384ee9b02b81aa4c8e576197c0811910a63376a7d60e68f964dad858ff0e46a8fd0952ddaf19c8f79f3fd05cefd7dbf2c043d52c5

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T22XS5WA\favicon[2].ico
      Filesize

      5KB

      MD5

      f3418a443e7d841097c714d69ec4bcb8

      SHA1

      49263695f6b0cdd72f45cf1b775e660fdc36c606

      SHA256

      6da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770

      SHA512

      82d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563

    • C:\Users\Admin\AppData\Local\Temp\CabD9BF.tmp
      Filesize

      61KB

      MD5

      fc4666cbca561e864e7fdf883a9e6661

      SHA1

      2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

      SHA256

      10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

      SHA512

      c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

    • C:\Users\Admin\AppData\Local\Temp\TarD9C0.tmp
      Filesize

      161KB

      MD5

      73b4b714b42fc9a6aaefd0ae59adb009

      SHA1

      efdaffd5b0ad21913d22001d91bf6c19ecb4ac41

      SHA256

      c0cf8cc04c34b5b80a2d86ad0eafb2dd71436f070c86b0321fba0201879625fd

      SHA512

      73af3c51b15f89237552b1718bef21fd80788fa416bab2cb2e7fb3a60d56249a716eda0d2dd68ab643752272640e7eaaaf57ce64bcb38373ddc3d035fb8d57cd

    • C:\Users\Admin\AppData\Local\Temp\TarDC08.tmp
      Filesize

      161KB

      MD5

      be2bec6e8c5653136d3e72fe53c98aa3

      SHA1

      a8182d6db17c14671c3d5766c72e58d87c0810de

      SHA256

      1919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd

      SHA512

      0d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\KKV1NHL5.txt
      Filesize

      607B

      MD5

      42482c71fe0b2e753a279d20bb4de49c

      SHA1

      fec9139ed231393f64b01cab066d00d5f811bd05

      SHA256

      edcf6575a9eef8201a45af3d70221f81a29143942de616093e22e6581e60d2a3

      SHA512

      09cffba6c502a14e2603e457e6ebaa8c3f294e78eaf3676710279b3e0d8cad5b88212b4985f24f5b3edd5a021f956ae8b11e61ef205e9b1d5bfad329b98a35af

    • C:\note.txt
      Filesize

      218B

      MD5

      afa6955439b8d516721231029fb9ca1b

      SHA1

      087a043cc123c0c0df2ffadcf8e71e3ac86bbae9

      SHA256

      8e9f20f6864c66576536c0b866c6ffdcf11397db67fe120e972e244c3c022270

      SHA512

      5da21a31fbc4e8250dffed30f66b896bdf007ac91948140334fe36a3f010e1bac3e70a07e9f3eb9da8633189091fd5cadcabbaacd3e01da0fe7ae28a11b3dddf