Resubmissions

06-04-2023 08:33

230406-kfx9eacc46 7

06-04-2023 08:30

230406-kedtdacc37 7

Analysis

  • max time kernel
    62s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06-04-2023 08:33

General

  • Target

    memz.bat

  • Size

    13KB

  • MD5

    44fbd58c401a7786da2e8b6a6291379e

  • SHA1

    9dbfd08fa557d9dce79911eb4bbddb2008d4f53f

  • SHA256

    d8b47727ea05305ad396977b336c3bfc86ae122cdde01976fa9b0c3a7c2d3f24

  • SHA512

    c369f749ba3ef4e463524b3483c4250311c2a19414a49dc86c052cac9c9d0a3b05dbdbf71b854ccf6f46abc46e439f9264c7672e22a0c3004b7d679e26a56de3

  • SSDEEP

    192:vOyUySl0UaDz2gWsIzlmj+BxZ3yqueWQx0lZicyC8Sh31xcjBzyxwn7AVhllz3:vVODaDSHMql3yqlxy5L1xcjwrlz3

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 7 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 29 IoCs
  • Suspicious use of SendNotifyMessage 28 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\memz.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1132
    • C:\Windows\system32\cscript.exe
      cscript x.js
      2⤵
      • Suspicious use of FindShellTrayWindow
      PID:1624
    • C:\Users\Admin\AppData\Roaming\MEMZ.exe
      "C:\Users\Admin\AppData\Roaming\MEMZ.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious use of WriteProcessMemory
      PID:1680
      • C:\Users\Admin\AppData\Roaming\MEMZ.exe
        "C:\Users\Admin\AppData\Roaming\MEMZ.exe" /watchdog
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:392
      • C:\Users\Admin\AppData\Roaming\MEMZ.exe
        "C:\Users\Admin\AppData\Roaming\MEMZ.exe" /watchdog
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:304
      • C:\Users\Admin\AppData\Roaming\MEMZ.exe
        "C:\Users\Admin\AppData\Roaming\MEMZ.exe" /watchdog
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:1704
      • C:\Users\Admin\AppData\Roaming\MEMZ.exe
        "C:\Users\Admin\AppData\Roaming\MEMZ.exe" /watchdog
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:1524
      • C:\Users\Admin\AppData\Roaming\MEMZ.exe
        "C:\Users\Admin\AppData\Roaming\MEMZ.exe" /watchdog
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:1664
      • C:\Users\Admin\AppData\Roaming\MEMZ.exe
        "C:\Users\Admin\AppData\Roaming\MEMZ.exe" /main
        3⤵
        • Executes dropped EXE
        • Writes to the Master Boot Record (MBR)
        • Suspicious use of WriteProcessMemory
        PID:1988
        • C:\Windows\SysWOW64\notepad.exe
          "C:\Windows\System32\notepad.exe" \note.txt
          4⤵
            PID:1868
          • C:\Windows\SysWOW64\taskmgr.exe
            "C:\Windows\System32\taskmgr.exe"
            4⤵
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            PID:924
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x0
      1⤵
        PID:1348

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\x
        Filesize

        4KB

        MD5

        214f98cb6a54654a4ca5c456f16aed0a

        SHA1

        2229090d2f6a1814ba648e5b5a5ae26389cba5a0

        SHA256

        45f18ccd8df88c127304a7855a608661b52b0ca813e87e06d87da15259c45037

        SHA512

        5f058b05f166e2688df7b3960e135ada25bbcdfbb62a11da3cf9e70c08c51e5589a1e6ca2250318a694d27197f2c5ba1028c443831c43fba2171ca8e072e9873

      • C:\Users\Admin\AppData\Local\Temp\x
        Filesize

        11KB

        MD5

        1882f3dd051e401349f1af58d55b0a37

        SHA1

        6b0875f9e3164f3a9f21c1ec36748a7243515b47

        SHA256

        3c8cea1a86f07b018e637a1ea2649d907573f78c7e4025ef7e514362d09ff6c0

        SHA512

        fec96d873997b5c6c82a94f8796c88fc2dd38739277c517b8129277dcbda02576851f1e27bdb2fbb7255281077d5b9ba867f6dfe66bedfc859c59fdd3bbffacf

      • C:\Users\Admin\AppData\Local\Temp\x.js
        Filesize

        448B

        MD5

        8eec8704d2a7bc80b95b7460c06f4854

        SHA1

        1b34585c1fa7ec0bd0505478ac9dbb8b8d19f326

        SHA256

        aa01b8864b43e92077a106ed3d4656a511f3ba1910fba40c78a32ee6a621d596

        SHA512

        e274b92810e9a30627a65f87448d784967a2fcfbf49858cbe6ccb841f09e0f53fde253ecc1ea0c7de491d8cc56a6cf8c79d1b7c657e72928cfb0479d11035210

      • C:\Users\Admin\AppData\Local\Temp\z.zip
        Filesize

        8KB

        MD5

        63ee4412b95d7ad64c54b4ba673470a7

        SHA1

        1cf423c6c2c6299e68e1927305a3057af9b3ce06

        SHA256

        44c1857b1c4894b3dfbaccbe04905652e634283dcf6b06c25a74b17021e2a268

        SHA512

        7ff153826bd5fed0a410f6d15a54787b79eba927d5b573c8a7f23f4ecef7bb223d79fd29fe8c2754fbf5b4c77ab7c41598f2989b6f4c7b2aa2f579ef4af06ee7

      • C:\Users\Admin\AppData\Local\Temp\z.zip
        Filesize

        8KB

        MD5

        63ee4412b95d7ad64c54b4ba673470a7

        SHA1

        1cf423c6c2c6299e68e1927305a3057af9b3ce06

        SHA256

        44c1857b1c4894b3dfbaccbe04905652e634283dcf6b06c25a74b17021e2a268

        SHA512

        7ff153826bd5fed0a410f6d15a54787b79eba927d5b573c8a7f23f4ecef7bb223d79fd29fe8c2754fbf5b4c77ab7c41598f2989b6f4c7b2aa2f579ef4af06ee7

      • C:\Users\Admin\AppData\Roaming\MEMZ.exe
        Filesize

        14KB

        MD5

        19dbec50735b5f2a72d4199c4e184960

        SHA1

        6fed7732f7cb6f59743795b2ab154a3676f4c822

        SHA256

        a3d5715a81f2fbeb5f76c88c9c21eeee87142909716472f911ff6950c790c24d

        SHA512

        aa8a6bbb1ec516d5d5acf8be6863a4c6c5d754cee12b3d374c3a6acb393376806edc422f0ffb661c210e5b9485da88521e4a0956a4b7b08a5467cfaacd90591d

      • C:\Users\Admin\AppData\Roaming\MEMZ.exe
        Filesize

        14KB

        MD5

        19dbec50735b5f2a72d4199c4e184960

        SHA1

        6fed7732f7cb6f59743795b2ab154a3676f4c822

        SHA256

        a3d5715a81f2fbeb5f76c88c9c21eeee87142909716472f911ff6950c790c24d

        SHA512

        aa8a6bbb1ec516d5d5acf8be6863a4c6c5d754cee12b3d374c3a6acb393376806edc422f0ffb661c210e5b9485da88521e4a0956a4b7b08a5467cfaacd90591d

      • C:\Users\Admin\AppData\Roaming\MEMZ.exe
        Filesize

        14KB

        MD5

        19dbec50735b5f2a72d4199c4e184960

        SHA1

        6fed7732f7cb6f59743795b2ab154a3676f4c822

        SHA256

        a3d5715a81f2fbeb5f76c88c9c21eeee87142909716472f911ff6950c790c24d

        SHA512

        aa8a6bbb1ec516d5d5acf8be6863a4c6c5d754cee12b3d374c3a6acb393376806edc422f0ffb661c210e5b9485da88521e4a0956a4b7b08a5467cfaacd90591d

      • C:\Users\Admin\AppData\Roaming\MEMZ.exe
        Filesize

        14KB

        MD5

        19dbec50735b5f2a72d4199c4e184960

        SHA1

        6fed7732f7cb6f59743795b2ab154a3676f4c822

        SHA256

        a3d5715a81f2fbeb5f76c88c9c21eeee87142909716472f911ff6950c790c24d

        SHA512

        aa8a6bbb1ec516d5d5acf8be6863a4c6c5d754cee12b3d374c3a6acb393376806edc422f0ffb661c210e5b9485da88521e4a0956a4b7b08a5467cfaacd90591d

      • C:\Users\Admin\AppData\Roaming\MEMZ.exe
        Filesize

        14KB

        MD5

        19dbec50735b5f2a72d4199c4e184960

        SHA1

        6fed7732f7cb6f59743795b2ab154a3676f4c822

        SHA256

        a3d5715a81f2fbeb5f76c88c9c21eeee87142909716472f911ff6950c790c24d

        SHA512

        aa8a6bbb1ec516d5d5acf8be6863a4c6c5d754cee12b3d374c3a6acb393376806edc422f0ffb661c210e5b9485da88521e4a0956a4b7b08a5467cfaacd90591d

      • C:\Users\Admin\AppData\Roaming\MEMZ.exe
        Filesize

        14KB

        MD5

        19dbec50735b5f2a72d4199c4e184960

        SHA1

        6fed7732f7cb6f59743795b2ab154a3676f4c822

        SHA256

        a3d5715a81f2fbeb5f76c88c9c21eeee87142909716472f911ff6950c790c24d

        SHA512

        aa8a6bbb1ec516d5d5acf8be6863a4c6c5d754cee12b3d374c3a6acb393376806edc422f0ffb661c210e5b9485da88521e4a0956a4b7b08a5467cfaacd90591d

      • C:\Users\Admin\AppData\Roaming\MEMZ.exe
        Filesize

        14KB

        MD5

        19dbec50735b5f2a72d4199c4e184960

        SHA1

        6fed7732f7cb6f59743795b2ab154a3676f4c822

        SHA256

        a3d5715a81f2fbeb5f76c88c9c21eeee87142909716472f911ff6950c790c24d

        SHA512

        aa8a6bbb1ec516d5d5acf8be6863a4c6c5d754cee12b3d374c3a6acb393376806edc422f0ffb661c210e5b9485da88521e4a0956a4b7b08a5467cfaacd90591d

      • C:\Users\Admin\AppData\Roaming\MEMZ.exe
        Filesize

        14KB

        MD5

        19dbec50735b5f2a72d4199c4e184960

        SHA1

        6fed7732f7cb6f59743795b2ab154a3676f4c822

        SHA256

        a3d5715a81f2fbeb5f76c88c9c21eeee87142909716472f911ff6950c790c24d

        SHA512

        aa8a6bbb1ec516d5d5acf8be6863a4c6c5d754cee12b3d374c3a6acb393376806edc422f0ffb661c210e5b9485da88521e4a0956a4b7b08a5467cfaacd90591d

      • C:\note.txt
        Filesize

        218B

        MD5

        afa6955439b8d516721231029fb9ca1b

        SHA1

        087a043cc123c0c0df2ffadcf8e71e3ac86bbae9

        SHA256

        8e9f20f6864c66576536c0b866c6ffdcf11397db67fe120e972e244c3c022270

        SHA512

        5da21a31fbc4e8250dffed30f66b896bdf007ac91948140334fe36a3f010e1bac3e70a07e9f3eb9da8633189091fd5cadcabbaacd3e01da0fe7ae28a11b3dddf

      • \Users\Admin\AppData\Roaming\MEMZ.exe
        Filesize

        14KB

        MD5

        19dbec50735b5f2a72d4199c4e184960

        SHA1

        6fed7732f7cb6f59743795b2ab154a3676f4c822

        SHA256

        a3d5715a81f2fbeb5f76c88c9c21eeee87142909716472f911ff6950c790c24d

        SHA512

        aa8a6bbb1ec516d5d5acf8be6863a4c6c5d754cee12b3d374c3a6acb393376806edc422f0ffb661c210e5b9485da88521e4a0956a4b7b08a5467cfaacd90591d

      • \Users\Admin\AppData\Roaming\MEMZ.exe
        Filesize

        14KB

        MD5

        19dbec50735b5f2a72d4199c4e184960

        SHA1

        6fed7732f7cb6f59743795b2ab154a3676f4c822

        SHA256

        a3d5715a81f2fbeb5f76c88c9c21eeee87142909716472f911ff6950c790c24d

        SHA512

        aa8a6bbb1ec516d5d5acf8be6863a4c6c5d754cee12b3d374c3a6acb393376806edc422f0ffb661c210e5b9485da88521e4a0956a4b7b08a5467cfaacd90591d

      • \Users\Admin\AppData\Roaming\MEMZ.exe
        Filesize

        14KB

        MD5

        19dbec50735b5f2a72d4199c4e184960

        SHA1

        6fed7732f7cb6f59743795b2ab154a3676f4c822

        SHA256

        a3d5715a81f2fbeb5f76c88c9c21eeee87142909716472f911ff6950c790c24d

        SHA512

        aa8a6bbb1ec516d5d5acf8be6863a4c6c5d754cee12b3d374c3a6acb393376806edc422f0ffb661c210e5b9485da88521e4a0956a4b7b08a5467cfaacd90591d

      • \Users\Admin\AppData\Roaming\MEMZ.exe
        Filesize

        14KB

        MD5

        19dbec50735b5f2a72d4199c4e184960

        SHA1

        6fed7732f7cb6f59743795b2ab154a3676f4c822

        SHA256

        a3d5715a81f2fbeb5f76c88c9c21eeee87142909716472f911ff6950c790c24d

        SHA512

        aa8a6bbb1ec516d5d5acf8be6863a4c6c5d754cee12b3d374c3a6acb393376806edc422f0ffb661c210e5b9485da88521e4a0956a4b7b08a5467cfaacd90591d

      • \Users\Admin\AppData\Roaming\MEMZ.exe
        Filesize

        14KB

        MD5

        19dbec50735b5f2a72d4199c4e184960

        SHA1

        6fed7732f7cb6f59743795b2ab154a3676f4c822

        SHA256

        a3d5715a81f2fbeb5f76c88c9c21eeee87142909716472f911ff6950c790c24d

        SHA512

        aa8a6bbb1ec516d5d5acf8be6863a4c6c5d754cee12b3d374c3a6acb393376806edc422f0ffb661c210e5b9485da88521e4a0956a4b7b08a5467cfaacd90591d

      • \Users\Admin\AppData\Roaming\MEMZ.exe
        Filesize

        14KB

        MD5

        19dbec50735b5f2a72d4199c4e184960

        SHA1

        6fed7732f7cb6f59743795b2ab154a3676f4c822

        SHA256

        a3d5715a81f2fbeb5f76c88c9c21eeee87142909716472f911ff6950c790c24d

        SHA512

        aa8a6bbb1ec516d5d5acf8be6863a4c6c5d754cee12b3d374c3a6acb393376806edc422f0ffb661c210e5b9485da88521e4a0956a4b7b08a5467cfaacd90591d

      • \Users\Admin\AppData\Roaming\MEMZ.exe
        Filesize

        14KB

        MD5

        19dbec50735b5f2a72d4199c4e184960

        SHA1

        6fed7732f7cb6f59743795b2ab154a3676f4c822

        SHA256

        a3d5715a81f2fbeb5f76c88c9c21eeee87142909716472f911ff6950c790c24d

        SHA512

        aa8a6bbb1ec516d5d5acf8be6863a4c6c5d754cee12b3d374c3a6acb393376806edc422f0ffb661c210e5b9485da88521e4a0956a4b7b08a5467cfaacd90591d

      • memory/1348-252-0x00000000027C0000-0x00000000027C1000-memory.dmp
        Filesize

        4KB

      • memory/1624-221-0x00000000034E0000-0x00000000034E1000-memory.dmp
        Filesize

        4KB