Resubmissions

07-04-2023 08:11

230407-j3f3zaae2s 7

07-04-2023 08:08

230407-j1q56aad91 7

07-04-2023 07:42

230407-jj2wbsad6z 7

Analysis

  • max time kernel
    448s
  • max time network
    397s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    07-04-2023 08:11

General

  • Target

    MEMZ 3.0/MEMZ.exe

  • Size

    12KB

  • MD5

    a7bcf7ea8e9f3f36ebfb85b823e39d91

  • SHA1

    761168201520c199dba68add3a607922d8d4a86e

  • SHA256

    3ff64f10603f0330fa2386ff99471ca789391ace969bd0ec1c1b8ce1b4a6db42

  • SHA512

    89923b669d31e590189fd06619bf27e47c5a47e82be6ae71fdb1b9b3b30b06fb7ca8ffed6d5c41ac410a367f2eb07589291e95a2644877d6bffd52775a5b1523

  • SSDEEP

    192:HMDLTxWDf/pl3cIEiwqZKBktLe3P+qf2jhP6B5b2yL3:H4IDH3cIqqvUWq+jhyT2yL

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\MEMZ 3.0\MEMZ.exe
    "C:\Users\Admin\AppData\Local\Temp\MEMZ 3.0\MEMZ.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1308
    • C:\Users\Admin\AppData\Local\Temp\MEMZ 3.0\MEMZ.exe
      "C:\Users\Admin\AppData\Local\Temp\MEMZ 3.0\MEMZ.exe" /watchdog
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1804
    • C:\Users\Admin\AppData\Local\Temp\MEMZ 3.0\MEMZ.exe
      "C:\Users\Admin\AppData\Local\Temp\MEMZ 3.0\MEMZ.exe" /watchdog
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:840
    • C:\Users\Admin\AppData\Local\Temp\MEMZ 3.0\MEMZ.exe
      "C:\Users\Admin\AppData\Local\Temp\MEMZ 3.0\MEMZ.exe" /watchdog
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:900
    • C:\Users\Admin\AppData\Local\Temp\MEMZ 3.0\MEMZ.exe
      "C:\Users\Admin\AppData\Local\Temp\MEMZ 3.0\MEMZ.exe" /watchdog
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2028
    • C:\Users\Admin\AppData\Local\Temp\MEMZ 3.0\MEMZ.exe
      "C:\Users\Admin\AppData\Local\Temp\MEMZ 3.0\MEMZ.exe" /watchdog
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1760
    • C:\Users\Admin\AppData\Local\Temp\MEMZ 3.0\MEMZ.exe
      "C:\Users\Admin\AppData\Local\Temp\MEMZ 3.0\MEMZ.exe" /main
      2⤵
      • Writes to the Master Boot Record (MBR)
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1312
      • C:\Windows\SysWOW64\notepad.exe
        "C:\Windows\System32\notepad.exe" \note.txt
        3⤵
          PID:1912
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" https://google.co.ck/search?q=what+happens+if+you+delete+system32
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:268
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:268 CREDAT:275457 /prefetch:2
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:924
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x16c
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1308

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Bootkit

    1
    T1067

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      61KB

      MD5

      e71c8443ae0bc2e282c73faead0a6dd3

      SHA1

      0c110c1b01e68edfacaeae64781a37b1995fa94b

      SHA256

      95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

      SHA512

      b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      9e90ab2c51f29f20cd966b7da51f957c

      SHA1

      14531166e8ed8227015e5ff2083f388a720b1ef5

      SHA256

      f2a96f4464e4c69a63133ad29ae4043182bf07483b504ca6260db63f635224da

      SHA512

      7016534452bb1ac9f4b1e78df09c2338a86e2da5a20d9336e6ba59435d99481b5bf84e971eb72c4da5369ccc44bedd2999c495d379863ad61e6d0b19e3ad4a5f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      c83a682c3cf9280203d508b630218e25

      SHA1

      f6c31f0a3ca42931864e1902b5bdaa5b49479f8f

      SHA256

      0149b9742a0bc5764ce62b916093e251afe1e98cd717adbc513265dadee87f5f

      SHA512

      37b9f67327109d8c84fd6df77f0cce86dc8c6f36fcf4f073d99e9e9b025f4246baf66b38c0075879936ee2b4dbabe3318dd7f42fef93c622fbbde51312834afe

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      2e39c5d37add7dc397b31521e55e600e

      SHA1

      440457f2a9be56b65d116fbf86a4761df7f01d50

      SHA256

      89adead3df6f840c8ea0bc84be32a07fc92994bf0dd218d8f4fa1c1ecc942ac9

      SHA512

      5f93057e0bd7d21691176452167437d26fad0c43ada46e823f9cc67376932c088341e06262998d3795f5f99329c204abb35a749e2d030c95c917e9f8da0ac0cd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      b6903a284d12ded44a9ac8289511d6c5

      SHA1

      6c5bcc79bce40897974c5fd4351a6d53d9fa7d06

      SHA256

      d23f9a2845cf3aa0909f4c67591da067648fe413f3e9bf3f0b99d82321a672cf

      SHA512

      8f69a3408a8f6629c01d3f7d6b65a31ae34ca832ffad76dc8974638096af64cffe53322389166b38d706572a65df38de1ca9b7db18be39bd653d2239f7db2fbf

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      0eaaa6691abf20a5c29af98407d9b4bc

      SHA1

      569c6a6edbaf2f3fff81bb031ada5b26110afe50

      SHA256

      1c3bf59493cceb4cdf7376066504c38aa62072cdcdf153609c3ea7d08d95b75c

      SHA512

      f109ecd14ac04893c1b70d636901be81786ecbd3edb7cd8681dc5b744543ffaa773b40f32fb515640b2d59aa1d048920242818b7727d2dd3d22b792bd686c79f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      6757c6b209430b6a8f06d4d8717920b1

      SHA1

      b9009c6bc44725703933e3622472f15f0bb9afd4

      SHA256

      7a4d56bad7d30a5e1bc83961418ac19c6f56bf083ca4be4b1cc1ccb673d81dd3

      SHA512

      39ad879b124d755af34680f65e78efaf3b8df04f13f83c7f4728cdfc31ead37de27ce4847225bb3ca6596cd31d52bd8204bfe916779b4effa6677238ab7d56ba

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      528792f2d07b30fd1c157c4c9722283e

      SHA1

      8179a2fbb0bf4e2b3cb727a072f98039fb94f885

      SHA256

      7bb103fcf3eb19c3e12faea7e6c52df121b1182d232235bdb7d1d901b3acf857

      SHA512

      12da8063e15d35297b4fe7953689e628fda1e1e4ed31fd021b2289bc2dedb419f358af5abb79b09a6fac8c303fe16035278990818cc5f63319aed311d283ad25

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      d31bb96b1148d098e85ba6855817bf18

      SHA1

      3f29b815d6fcb4df318a2e431760ef97a7afce25

      SHA256

      028afa57402575bce4377473da6eb33577bcd7b131fcf24bf1fba825da0f04f0

      SHA512

      66187a758527620a585451655cd43557b60c6ce25865da7f790267c19043ad4bf707960697bdb4c692fe86a7b25dc883e8e7908b25be3c6b754381b3c1a329a3

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\07asiie\imagestore.dat
      Filesize

      9KB

      MD5

      8722e9a322d106652f0b16bc4293c587

      SHA1

      bfdd0b4c4fb57f3b7bfe1beae08b8d89d7354f6a

      SHA256

      8a90e0d8881e191074643d3f4c2de1af7fd3f1649fd73e7bee66acf8387285f4

      SHA512

      763459470e7ef5151b99f1d728292066ccb4ec24a0078dbda68c47ac15332154785db8a7fdc0265f9b7629affc4a57efa7a4ac5711c207e8645cb2159349a6d8

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T210ZMR0\favicon[2].ico
      Filesize

      5KB

      MD5

      f3418a443e7d841097c714d69ec4bcb8

      SHA1

      49263695f6b0cdd72f45cf1b775e660fdc36c606

      SHA256

      6da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770

      SHA512

      82d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TF0W5LQL\suggestions[1].en-US
      Filesize

      17KB

      MD5

      5a34cb996293fde2cb7a4ac89587393a

      SHA1

      3c96c993500690d1a77873cd62bc639b3a10653f

      SHA256

      c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

      SHA512

      e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

    • C:\Users\Admin\AppData\Local\Temp\CabA3A0.tmp
      Filesize

      61KB

      MD5

      fc4666cbca561e864e7fdf883a9e6661

      SHA1

      2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

      SHA256

      10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

      SHA512

      c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

    • C:\Users\Admin\AppData\Local\Temp\TarC6CC.tmp
      Filesize

      161KB

      MD5

      73b4b714b42fc9a6aaefd0ae59adb009

      SHA1

      efdaffd5b0ad21913d22001d91bf6c19ecb4ac41

      SHA256

      c0cf8cc04c34b5b80a2d86ad0eafb2dd71436f070c86b0321fba0201879625fd

      SHA512

      73af3c51b15f89237552b1718bef21fd80788fa416bab2cb2e7fb3a60d56249a716eda0d2dd68ab643752272640e7eaaaf57ce64bcb38373ddc3d035fb8d57cd

    • C:\Users\Admin\AppData\Local\Temp\TarC943.tmp
      Filesize

      161KB

      MD5

      be2bec6e8c5653136d3e72fe53c98aa3

      SHA1

      a8182d6db17c14671c3d5766c72e58d87c0810de

      SHA256

      1919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd

      SHA512

      0d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\5WBF52ZJ.txt
      Filesize

      606B

      MD5

      39faf180a14b327e3c4e2b30896da27f

      SHA1

      ac4a10981616d27884d3b209367ddba7956f9505

      SHA256

      23d7cdd34e850a451afd0dbba7cd26eeb6fcca64098a81d8f7d002c34520993f

      SHA512

      b084985803c944c2c3545e64a63b0812530e1d92f45232739d0feeb4f76079ad0a0811775105fcba635872afccb0f9e8852c0fbfbaf692430b8303640b205541

    • C:\note.txt
      Filesize

      218B

      MD5

      afa6955439b8d516721231029fb9ca1b

      SHA1

      087a043cc123c0c0df2ffadcf8e71e3ac86bbae9

      SHA256

      8e9f20f6864c66576536c0b866c6ffdcf11397db67fe120e972e244c3c022270

      SHA512

      5da21a31fbc4e8250dffed30f66b896bdf007ac91948140334fe36a3f010e1bac3e70a07e9f3eb9da8633189091fd5cadcabbaacd3e01da0fe7ae28a11b3dddf