Overview
overview
7Static
static
1memez-master.zip
windows7-x64
3memez-master.zip
windows10-1703-x64
1memez-mast...ibutes
windows7-x64
3memez-mast...ibutes
windows10-1703-x64
3memez-mast...ignore
windows7-x64
3memez-mast...ignore
windows10-1703-x64
3memez-mast...DME.md
windows7-x64
3memez-mast...DME.md
windows10-1703-x64
3memez-mast...ll.ps1
windows7-x64
7memez-mast...ll.ps1
windows10-1703-x64
7memez-mast...ez.sln
windows7-x64
3memez-mast...ez.sln
windows10-1703-x64
3memez-mast...ez.cpp
windows7-x64
3memez-mast...ez.cpp
windows10-1703-x64
3memez-mast...mez.rc
windows7-x64
3memez-mast...mez.rc
windows10-1703-x64
3memez-mast...ez.xml
windows7-x64
1memez-mast...ez.xml
windows10-1703-x64
1memez-mast...ilters
windows7-x64
3memez-mast...ilters
windows10-1703-x64
3memez-mast...urce.h
windows7-x64
3memez-mast...urce.h
windows10-1703-x64
3Analysis
-
max time kernel
76s -
max time network
87s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
20/05/2023, 02:56
Static task
static1
Behavioral task
behavioral1
Sample
memez-master.zip
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
memez-master.zip
Resource
win10-20230220-en
Behavioral task
behavioral3
Sample
memez-master/.gitattributes
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
memez-master/.gitattributes
Resource
win10-20230220-en
Behavioral task
behavioral5
Sample
memez-master/.gitignore
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
memez-master/.gitignore
Resource
win10-20230220-en
Behavioral task
behavioral7
Sample
memez-master/README.md
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
memez-master/README.md
Resource
win10-20230220-en
Behavioral task
behavioral9
Sample
memez-master/install.ps1
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
memez-master/install.ps1
Resource
win10-20230220-en
Behavioral task
behavioral11
Sample
memez-master/memez.sln
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
memez-master/memez.sln
Resource
win10-20230220-en
Behavioral task
behavioral13
Sample
memez-master/memez/memez.cpp
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
memez-master/memez/memez.cpp
Resource
win10-20230220-en
Behavioral task
behavioral15
Sample
memez-master/memez/memez.rc
Resource
win7-20230220-en
Behavioral task
behavioral16
Sample
memez-master/memez/memez.rc
Resource
win10-20230220-en
Behavioral task
behavioral17
Sample
memez-master/memez/memez.xml
Resource
win7-20230220-en
Behavioral task
behavioral18
Sample
memez-master/memez/memez.xml
Resource
win10-20230220-en
Behavioral task
behavioral19
Sample
memez-master/memez/memez.vcxproj.filters
Resource
win7-20230220-en
Behavioral task
behavioral20
Sample
memez-master/memez/memez.vcxproj.filters
Resource
win10-20230220-en
Behavioral task
behavioral21
Sample
memez-master/memez/resource.h
Resource
win7-20230220-en
Behavioral task
behavioral22
Sample
memez-master/memez/resource.h
Resource
win10-20230220-en
General
-
Target
memez-master/install.ps1
-
Size
738B
-
MD5
63218cee4634763d4eab7c4828631545
-
SHA1
34bb64b46a3c767ca74dea18459768023fcf036b
-
SHA256
8031cd26ed09c732ca5603725d1a337ed5e2f24f25f26a2fa4f696f336e7e781
-
SHA512
e1f15e5b109fcc90e3e3631d233f23d65db54db5b669541e9c29415dd96bf2643d99bee71f0e022ef208011c24d9b538cc39fc2d9cd55bae4c29fef2d6152ae5
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 3552 icacls.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 4072 powershell.exe 4072 powershell.exe 4072 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4072 powershell.exe Token: SeRestorePrivilege 3552 icacls.exe Token: SeIncreaseQuotaPrivilege 4072 powershell.exe Token: SeSecurityPrivilege 4072 powershell.exe Token: SeTakeOwnershipPrivilege 4072 powershell.exe Token: SeLoadDriverPrivilege 4072 powershell.exe Token: SeSystemProfilePrivilege 4072 powershell.exe Token: SeSystemtimePrivilege 4072 powershell.exe Token: SeProfSingleProcessPrivilege 4072 powershell.exe Token: SeIncBasePriorityPrivilege 4072 powershell.exe Token: SeCreatePagefilePrivilege 4072 powershell.exe Token: SeBackupPrivilege 4072 powershell.exe Token: SeRestorePrivilege 4072 powershell.exe Token: SeShutdownPrivilege 4072 powershell.exe Token: SeDebugPrivilege 4072 powershell.exe Token: SeSystemEnvironmentPrivilege 4072 powershell.exe Token: SeRemoteShutdownPrivilege 4072 powershell.exe Token: SeUndockPrivilege 4072 powershell.exe Token: SeManageVolumePrivilege 4072 powershell.exe Token: 33 4072 powershell.exe Token: 34 4072 powershell.exe Token: 35 4072 powershell.exe Token: 36 4072 powershell.exe Token: SeIncreaseQuotaPrivilege 4072 powershell.exe Token: SeSecurityPrivilege 4072 powershell.exe Token: SeTakeOwnershipPrivilege 4072 powershell.exe Token: SeLoadDriverPrivilege 4072 powershell.exe Token: SeSystemProfilePrivilege 4072 powershell.exe Token: SeSystemtimePrivilege 4072 powershell.exe Token: SeProfSingleProcessPrivilege 4072 powershell.exe Token: SeIncBasePriorityPrivilege 4072 powershell.exe Token: SeCreatePagefilePrivilege 4072 powershell.exe Token: SeBackupPrivilege 4072 powershell.exe Token: SeRestorePrivilege 4072 powershell.exe Token: SeShutdownPrivilege 4072 powershell.exe Token: SeDebugPrivilege 4072 powershell.exe Token: SeSystemEnvironmentPrivilege 4072 powershell.exe Token: SeRemoteShutdownPrivilege 4072 powershell.exe Token: SeUndockPrivilege 4072 powershell.exe Token: SeManageVolumePrivilege 4072 powershell.exe Token: 33 4072 powershell.exe Token: 34 4072 powershell.exe Token: 35 4072 powershell.exe Token: 36 4072 powershell.exe Token: SeIncreaseQuotaPrivilege 4072 powershell.exe Token: SeSecurityPrivilege 4072 powershell.exe Token: SeTakeOwnershipPrivilege 4072 powershell.exe Token: SeLoadDriverPrivilege 4072 powershell.exe Token: SeSystemProfilePrivilege 4072 powershell.exe Token: SeSystemtimePrivilege 4072 powershell.exe Token: SeProfSingleProcessPrivilege 4072 powershell.exe Token: SeIncBasePriorityPrivilege 4072 powershell.exe Token: SeCreatePagefilePrivilege 4072 powershell.exe Token: SeBackupPrivilege 4072 powershell.exe Token: SeRestorePrivilege 4072 powershell.exe Token: SeShutdownPrivilege 4072 powershell.exe Token: SeDebugPrivilege 4072 powershell.exe Token: SeSystemEnvironmentPrivilege 4072 powershell.exe Token: SeRemoteShutdownPrivilege 4072 powershell.exe Token: SeUndockPrivilege 4072 powershell.exe Token: SeManageVolumePrivilege 4072 powershell.exe Token: 33 4072 powershell.exe Token: 34 4072 powershell.exe Token: 35 4072 powershell.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4072 wrote to memory of 3552 4072 powershell.exe 67 PID 4072 wrote to memory of 3552 4072 powershell.exe 67
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\memez-master\install.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" C:\memez.exe /setowner admin2⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:3552
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a