Resubmissions

31-03-2023 20:37

230331-zedkyadc34 7

31-03-2023 20:34

230331-zcqgqaee9t 7

31-03-2023 20:32

230331-zbentsdb88 7

31-03-2023 20:28

230331-y8zvladb76 7

Analysis

  • max time kernel
    300s
  • max time network
    198s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    31-03-2023 20:32

General

  • Target

    MEMZ.exe

  • Size

    12KB

  • MD5

    a7bcf7ea8e9f3f36ebfb85b823e39d91

  • SHA1

    761168201520c199dba68add3a607922d8d4a86e

  • SHA256

    3ff64f10603f0330fa2386ff99471ca789391ace969bd0ec1c1b8ce1b4a6db42

  • SHA512

    89923b669d31e590189fd06619bf27e47c5a47e82be6ae71fdb1b9b3b30b06fb7ca8ffed6d5c41ac410a367f2eb07589291e95a2644877d6bffd52775a5b1523

  • SSDEEP

    192:HMDLTxWDf/pl3cIEiwqZKBktLe3P+qf2jhP6B5b2yL3:H4IDH3cIqqvUWq+jhyT2yL

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\MEMZ.exe
    "C:\Users\Admin\AppData\Local\Temp\MEMZ.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Users\Admin\AppData\Local\Temp\MEMZ.exe
      "C:\Users\Admin\AppData\Local\Temp\MEMZ.exe" /watchdog
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1992
    • C:\Users\Admin\AppData\Local\Temp\MEMZ.exe
      "C:\Users\Admin\AppData\Local\Temp\MEMZ.exe" /watchdog
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2004
    • C:\Users\Admin\AppData\Local\Temp\MEMZ.exe
      "C:\Users\Admin\AppData\Local\Temp\MEMZ.exe" /watchdog
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1252
    • C:\Users\Admin\AppData\Local\Temp\MEMZ.exe
      "C:\Users\Admin\AppData\Local\Temp\MEMZ.exe" /watchdog
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1968
    • C:\Users\Admin\AppData\Local\Temp\MEMZ.exe
      "C:\Users\Admin\AppData\Local\Temp\MEMZ.exe" /watchdog
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1952
    • C:\Users\Admin\AppData\Local\Temp\MEMZ.exe
      "C:\Users\Admin\AppData\Local\Temp\MEMZ.exe" /main
      2⤵
      • Writes to the Master Boot Record (MBR)
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:524
      • C:\Windows\SysWOW64\notepad.exe
        "C:\Windows\System32\notepad.exe" \note.txt
        3⤵
          PID:560
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" https://google.co.ck/search?q=my+computer+is+doing+weird+things+wtf+is+happenin+plz+halp
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1240
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1240 CREDAT:275457 /prefetch:2
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2044
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x4fc
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2036

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Bootkit

    1
    T1067

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      61KB

      MD5

      e71c8443ae0bc2e282c73faead0a6dd3

      SHA1

      0c110c1b01e68edfacaeae64781a37b1995fa94b

      SHA256

      95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

      SHA512

      b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      e72774e0365d84b6b42063f21e86877e

      SHA1

      02132b10e671653d768957f14383afaa20e67e4b

      SHA256

      cd5411668d5ff7823ab08b53adfacf00b9e6b5fcac42e615898ff66bb2721694

      SHA512

      bf2fd02e76250324c7351365e131d2312404be0ce54d86a1e1f20a1c25cfe0dc87dab13713523f464ce9daec39b866c380536dd2552c733fdf1281dc01b5ea48

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      a6313960b159b548b4845335b9b5bae4

      SHA1

      9c48f9e90b5b800674e49f3439376337f00ba8da

      SHA256

      7080aa3a61d88b61c7017dcbcffff870c5fe70b335fc28dbe9918e20379608b3

      SHA512

      ee1d9e7b63d3f0ef6bdfc709f589751bbd540634e24861f4b1d71958bd5d34d3cfd9ea3f4a1452a4ce9eb64885f19ddc76b273c4860ad1bbb30ecd8c60a44936

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      337104c5c37bd485b8cd55558b46f77e

      SHA1

      a9ccbd76ebc288e636752912d560c328d253bcf0

      SHA256

      4650ac289335fc347ef36d72c457b6a820da641cd390415a8e4352b6f96b6ea3

      SHA512

      e2820a0cc1c1bb4f6da498caa71cccbd5907c62ae7fa990ee8593725e9fa0762b0002963135ef8e6f5dc2fe6755f7fc808b5d29b15140505473179211ee57701

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      93b22b50364287d5ac113b41974c7918

      SHA1

      88acfe793328ccf6e61bdb7f266db5e2bc7d7854

      SHA256

      92f8f3098a50124fe9df175485145ca7878b57711c4ea59b41de3cb981853322

      SHA512

      48fc6dde7bc465329d4db0468966175da82958e85f61b235d47d71d9e63cf884e0cee6e6126a1205b01039aa13e521a2dbb272ab67e97d024469f99812098ab6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      6ff39a50d9ee7d0b09bb30a91e164a8b

      SHA1

      76971e794a85f05781108e591ab5d90a99bd253e

      SHA256

      2d5dff434a24b952d47fd53e0855456281101f5322aeba2b6cd049f479546609

      SHA512

      5ebea135e450c812f0e460efa5395325f92b12e5ea125493494d4eb3ea2b2bd468c7b5267646fe23d6090848bc8ab1a958f58ca25cbd25207d5b88ae5c90604b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      99a1c1030a3938e3f0813742cbf4d194

      SHA1

      159d5f3a9ba24aff608946085a8ffedcc0b93772

      SHA256

      70d6ea72d3beb332616a8243953053d6aade55407a077c240b5b7bf5d3a8af94

      SHA512

      b19e3c0b27603686af7463bfaa0961d8c0aaf8b48df9258645dfff03b82183c9809144cceec59dd149a9dd0b4e9836dcf4b29358da2bf7b851dafae4c778b69f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      ca1f6f8e4bb5e1fb1c02de9fe0ed9743

      SHA1

      7d1a137f72ebd7c31812ae94b3bec1269e2f2f1e

      SHA256

      5c66498501b610c62823a00569ee47b275ed1557a74e9e62decb8ce390c29fac

      SHA512

      aa82b1e26f7ce660fb47440bf4733072fcfaf0f5558b6a3b4af49e3946fe1d539294dd1a97e6c541b99da8cc0e2cfba3842ff0776958f72732d6126ac11f9607

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      58d1510a25a5577034715abfbc5bc42f

      SHA1

      35e29ab5bf9e24d838bc1b9da12abd0830618cfa

      SHA256

      cc0ae9be395d3ca5e1c1675b234a7845cdc789e626fcd811281baa993709eb98

      SHA512

      a49ec67791a2011a79b4eea9e22596131ff60daba274d563732bba307bf78a3cf1ae0096fd9920f5dbb18356d1ce7801906b74dd9e523c873f1feb52c1a9864e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      ac7334dcc2e28d657b38c234cc7a306d

      SHA1

      498c2fe7873da419c6a388094ec4b52687bab9d8

      SHA256

      28b239acbd9bf2e6dc221f0520adf1165181c6ccd52b3133e6c4f35e706f8bac

      SHA512

      c0bb97e5c730aa9c91f369c0d752429c60cfb83350fee2976fc00414fb69466b2e61f84e24b04ec525dc0abe33e724d10396c6ffd1c74e0dfe63a048a0d0454c

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\x4s3ygl\imagestore.dat
      Filesize

      9KB

      MD5

      17d3e387f3de920d46af7aba415c5af7

      SHA1

      10084f292c85e10f1431140532723afa56db58c6

      SHA256

      9c0b130b459bb4c652e660ad5afcb80fa73edd6cbe2fb07d0c252ad74593302a

      SHA512

      b5d92475380a5ee109e90735c4859b2030af52ce211d30698d47717ef5c2e6aaf08cadfe3752597997b1a26e0ba6e47e9206707ccb28b1274afcec75c88e5ed3

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HYTOKVEV\suggestions[1].en-US
      Filesize

      17KB

      MD5

      5a34cb996293fde2cb7a4ac89587393a

      SHA1

      3c96c993500690d1a77873cd62bc639b3a10653f

      SHA256

      c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

      SHA512

      e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R2EIRHNV\favicon[2].ico
      Filesize

      5KB

      MD5

      f3418a443e7d841097c714d69ec4bcb8

      SHA1

      49263695f6b0cdd72f45cf1b775e660fdc36c606

      SHA256

      6da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770

      SHA512

      82d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563

    • C:\Users\Admin\AppData\Local\Temp\Cab348B.tmp
      Filesize

      61KB

      MD5

      fc4666cbca561e864e7fdf883a9e6661

      SHA1

      2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

      SHA256

      10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

      SHA512

      c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

    • C:\Users\Admin\AppData\Local\Temp\Tar349D.tmp
      Filesize

      161KB

      MD5

      73b4b714b42fc9a6aaefd0ae59adb009

      SHA1

      efdaffd5b0ad21913d22001d91bf6c19ecb4ac41

      SHA256

      c0cf8cc04c34b5b80a2d86ad0eafb2dd71436f070c86b0321fba0201879625fd

      SHA512

      73af3c51b15f89237552b1718bef21fd80788fa416bab2cb2e7fb3a60d56249a716eda0d2dd68ab643752272640e7eaaaf57ce64bcb38373ddc3d035fb8d57cd

    • C:\Users\Admin\AppData\Local\Temp\Tar3935.tmp
      Filesize

      161KB

      MD5

      be2bec6e8c5653136d3e72fe53c98aa3

      SHA1

      a8182d6db17c14671c3d5766c72e58d87c0810de

      SHA256

      1919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd

      SHA512

      0d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\TIG1UU4C.txt
      Filesize

      608B

      MD5

      415b4a4ca0ec2fe4ff2fc9a9b91246b0

      SHA1

      45ddf5c2d75d7ef56d70fea1da805e3475a02046

      SHA256

      364c923783e5ae67762c5bc1033d0a94f79dfe97e8b11e67f34f40c0dc3ee80a

      SHA512

      85e125d5207593e9c5eaaf1dc4918c914a3363ed695db7d68a2939c33f9cb3fd17f73d3d43fe6f8dcd20b0d1145584114c0d866d111a021852c1c7896a5ae8ea

    • C:\note.txt
      Filesize

      218B

      MD5

      afa6955439b8d516721231029fb9ca1b

      SHA1

      087a043cc123c0c0df2ffadcf8e71e3ac86bbae9

      SHA256

      8e9f20f6864c66576536c0b866c6ffdcf11397db67fe120e972e244c3c022270

      SHA512

      5da21a31fbc4e8250dffed30f66b896bdf007ac91948140334fe36a3f010e1bac3e70a07e9f3eb9da8633189091fd5cadcabbaacd3e01da0fe7ae28a11b3dddf