Resubmissions
05-05-2023 12:47
230505-pz63waaf24 704-05-2023 21:52
230504-1q4f6sfd43 804-05-2023 20:56
230504-zrfwtsha3v 704-05-2023 20:51
230504-znmvzagh9t 7Analysis
-
max time kernel
211s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
04-05-2023 20:51
Static task
static1
Behavioral task
behavioral1
Sample
MEMZ.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
MEMZ.exe
Resource
win10v2004-20230220-en
General
-
Target
MEMZ.exe
-
Size
16KB
-
MD5
1d5ad9c8d3fee874d0feb8bfac220a11
-
SHA1
ca6d3f7e6c784155f664a9179ca64e4034df9595
-
SHA256
3872c12d31fc9825e8661ac01ecee2572460677afbc7093f920a8436a42e28ff
-
SHA512
c8246f4137416be33b6d1ac89f2428b7c44d9376ac8489a9fbf65ef128a6c53fb50479e1e400c8e201c8611992ab1d6c1bd3d6cece89013edb4d35cdd22305b1
-
SSDEEP
192:M2WgyvSW8gRc6olcIEiwqZKBkDFR43xWTM3LHf26gFrcx3sNq:JWgnSmFlcIqq3agmLH+6gF23sN
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 MEMZ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1084 MEMZ.exe 1956 MEMZ.exe 472 MEMZ.exe 660 MEMZ.exe 332 MEMZ.exe 1084 MEMZ.exe 1956 MEMZ.exe 472 MEMZ.exe 660 MEMZ.exe 332 MEMZ.exe 1084 MEMZ.exe 1956 MEMZ.exe 472 MEMZ.exe 660 MEMZ.exe 332 MEMZ.exe 1084 MEMZ.exe 1956 MEMZ.exe 472 MEMZ.exe 660 MEMZ.exe 332 MEMZ.exe 1084 MEMZ.exe 1956 MEMZ.exe 472 MEMZ.exe 660 MEMZ.exe 332 MEMZ.exe 1084 MEMZ.exe 1956 MEMZ.exe 472 MEMZ.exe 660 MEMZ.exe 332 MEMZ.exe 1084 MEMZ.exe 1956 MEMZ.exe 472 MEMZ.exe 660 MEMZ.exe 332 MEMZ.exe 1084 MEMZ.exe 1956 MEMZ.exe 472 MEMZ.exe 660 MEMZ.exe 332 MEMZ.exe 1084 MEMZ.exe 1956 MEMZ.exe 472 MEMZ.exe 660 MEMZ.exe 332 MEMZ.exe 1084 MEMZ.exe 1956 MEMZ.exe 472 MEMZ.exe 660 MEMZ.exe 332 MEMZ.exe 1084 MEMZ.exe 1956 MEMZ.exe 472 MEMZ.exe 660 MEMZ.exe 332 MEMZ.exe 1084 MEMZ.exe 1956 MEMZ.exe 472 MEMZ.exe 660 MEMZ.exe 332 MEMZ.exe 1084 MEMZ.exe 1956 MEMZ.exe 472 MEMZ.exe 660 MEMZ.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1800 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: 33 816 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 816 AUDIODG.EXE Token: 33 816 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 816 AUDIODG.EXE Token: SeDebugPrivilege 1800 taskmgr.exe Token: SeShutdownPrivilege 472 MEMZ.exe Token: SeShutdownPrivilege 660 MEMZ.exe -
Suspicious use of FindShellTrayWindow 43 IoCs
pid Process 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 472 MEMZ.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe -
Suspicious use of SendNotifyMessage 42 IoCs
pid Process 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe 1800 taskmgr.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 472 MEMZ.exe 660 MEMZ.exe 1084 MEMZ.exe 1956 MEMZ.exe 472 MEMZ.exe 660 MEMZ.exe 1084 MEMZ.exe 1956 MEMZ.exe 472 MEMZ.exe 660 MEMZ.exe 1084 MEMZ.exe 1956 MEMZ.exe 472 MEMZ.exe 660 MEMZ.exe 340 MEMZ.exe 1084 MEMZ.exe 1956 MEMZ.exe 472 MEMZ.exe 660 MEMZ.exe 1084 MEMZ.exe 1956 MEMZ.exe 472 MEMZ.exe 660 MEMZ.exe 1084 MEMZ.exe 1956 MEMZ.exe 472 MEMZ.exe 660 MEMZ.exe 1084 MEMZ.exe 1956 MEMZ.exe 472 MEMZ.exe 660 MEMZ.exe 1084 MEMZ.exe 1956 MEMZ.exe 472 MEMZ.exe 660 MEMZ.exe 1084 MEMZ.exe 1956 MEMZ.exe 472 MEMZ.exe 660 MEMZ.exe 1084 MEMZ.exe 1956 MEMZ.exe 472 MEMZ.exe 660 MEMZ.exe 1084 MEMZ.exe 1956 MEMZ.exe 472 MEMZ.exe 660 MEMZ.exe 1084 MEMZ.exe 1956 MEMZ.exe 472 MEMZ.exe 660 MEMZ.exe 1084 MEMZ.exe 1956 MEMZ.exe 472 MEMZ.exe 660 MEMZ.exe 1084 MEMZ.exe 1956 MEMZ.exe 472 MEMZ.exe 660 MEMZ.exe 1084 MEMZ.exe 1956 MEMZ.exe 472 MEMZ.exe 660 MEMZ.exe 1084 MEMZ.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2008 wrote to memory of 1084 2008 MEMZ.exe 27 PID 2008 wrote to memory of 1084 2008 MEMZ.exe 27 PID 2008 wrote to memory of 1084 2008 MEMZ.exe 27 PID 2008 wrote to memory of 1084 2008 MEMZ.exe 27 PID 2008 wrote to memory of 1956 2008 MEMZ.exe 28 PID 2008 wrote to memory of 1956 2008 MEMZ.exe 28 PID 2008 wrote to memory of 1956 2008 MEMZ.exe 28 PID 2008 wrote to memory of 1956 2008 MEMZ.exe 28 PID 2008 wrote to memory of 472 2008 MEMZ.exe 29 PID 2008 wrote to memory of 472 2008 MEMZ.exe 29 PID 2008 wrote to memory of 472 2008 MEMZ.exe 29 PID 2008 wrote to memory of 472 2008 MEMZ.exe 29 PID 2008 wrote to memory of 660 2008 MEMZ.exe 30 PID 2008 wrote to memory of 660 2008 MEMZ.exe 30 PID 2008 wrote to memory of 660 2008 MEMZ.exe 30 PID 2008 wrote to memory of 660 2008 MEMZ.exe 30 PID 2008 wrote to memory of 332 2008 MEMZ.exe 31 PID 2008 wrote to memory of 332 2008 MEMZ.exe 31 PID 2008 wrote to memory of 332 2008 MEMZ.exe 31 PID 2008 wrote to memory of 332 2008 MEMZ.exe 31 PID 2008 wrote to memory of 340 2008 MEMZ.exe 32 PID 2008 wrote to memory of 340 2008 MEMZ.exe 32 PID 2008 wrote to memory of 340 2008 MEMZ.exe 32 PID 2008 wrote to memory of 340 2008 MEMZ.exe 32 PID 340 wrote to memory of 972 340 MEMZ.exe 33 PID 340 wrote to memory of 972 340 MEMZ.exe 33 PID 340 wrote to memory of 972 340 MEMZ.exe 33 PID 340 wrote to memory of 972 340 MEMZ.exe 33 PID 340 wrote to memory of 1600 340 MEMZ.exe 34 PID 340 wrote to memory of 1600 340 MEMZ.exe 34 PID 340 wrote to memory of 1600 340 MEMZ.exe 34 PID 340 wrote to memory of 1600 340 MEMZ.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\MEMZ.exe"C:\Users\Admin\AppData\Local\Temp\MEMZ.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\MEMZ.exe"C:\Users\Admin\AppData\Local\Temp\MEMZ.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1084
-
-
C:\Users\Admin\AppData\Local\Temp\MEMZ.exe"C:\Users\Admin\AppData\Local\Temp\MEMZ.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1956
-
-
C:\Users\Admin\AppData\Local\Temp\MEMZ.exe"C:\Users\Admin\AppData\Local\Temp\MEMZ.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:472
-
-
C:\Users\Admin\AppData\Local\Temp\MEMZ.exe"C:\Users\Admin\AppData\Local\Temp\MEMZ.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:660
-
-
C:\Users\Admin\AppData\Local\Temp\MEMZ.exe"C:\Users\Admin\AppData\Local\Temp\MEMZ.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
PID:332
-
-
C:\Users\Admin\AppData\Local\Temp\MEMZ.exe"C:\Users\Admin\AppData\Local\Temp\MEMZ.exe" /main2⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\System32\notepad.exe" \note.txt3⤵PID:972
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵PID:1600
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5501⤵
- Suspicious use of AdjustPrivilegeToken
PID:816
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1800
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
218B
MD5afa6955439b8d516721231029fb9ca1b
SHA1087a043cc123c0c0df2ffadcf8e71e3ac86bbae9
SHA2568e9f20f6864c66576536c0b866c6ffdcf11397db67fe120e972e244c3c022270
SHA5125da21a31fbc4e8250dffed30f66b896bdf007ac91948140334fe36a3f010e1bac3e70a07e9f3eb9da8633189091fd5cadcabbaacd3e01da0fe7ae28a11b3dddf