Overview
overview
7Static
static
1memez-master.zip
windows7-x64
3memez-master.zip
windows10-1703-x64
1memez-mast...ibutes
windows7-x64
3memez-mast...ibutes
windows10-1703-x64
3memez-mast...ignore
windows7-x64
3memez-mast...ignore
windows10-1703-x64
3memez-mast...DME.md
windows7-x64
3memez-mast...DME.md
windows10-1703-x64
3memez-mast...ll.ps1
windows7-x64
7memez-mast...ll.ps1
windows10-1703-x64
7memez-mast...ez.sln
windows7-x64
3memez-mast...ez.sln
windows10-1703-x64
3memez-mast...ez.cpp
windows7-x64
3memez-mast...ez.cpp
windows10-1703-x64
3memez-mast...mez.rc
windows7-x64
3memez-mast...mez.rc
windows10-1703-x64
3memez-mast...ez.xml
windows7-x64
1memez-mast...ez.xml
windows10-1703-x64
1memez-mast...ilters
windows7-x64
3memez-mast...ilters
windows10-1703-x64
3memez-mast...urce.h
windows7-x64
3memez-mast...urce.h
windows10-1703-x64
3Analysis
-
max time kernel
59s -
max time network
65s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
20/05/2023, 02:56
Static task
static1
Behavioral task
behavioral1
Sample
memez-master.zip
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
memez-master.zip
Resource
win10-20230220-en
Behavioral task
behavioral3
Sample
memez-master/.gitattributes
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
memez-master/.gitattributes
Resource
win10-20230220-en
Behavioral task
behavioral5
Sample
memez-master/.gitignore
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
memez-master/.gitignore
Resource
win10-20230220-en
Behavioral task
behavioral7
Sample
memez-master/README.md
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
memez-master/README.md
Resource
win10-20230220-en
Behavioral task
behavioral9
Sample
memez-master/install.ps1
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
memez-master/install.ps1
Resource
win10-20230220-en
Behavioral task
behavioral11
Sample
memez-master/memez.sln
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
memez-master/memez.sln
Resource
win10-20230220-en
Behavioral task
behavioral13
Sample
memez-master/memez/memez.cpp
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
memez-master/memez/memez.cpp
Resource
win10-20230220-en
Behavioral task
behavioral15
Sample
memez-master/memez/memez.rc
Resource
win7-20230220-en
Behavioral task
behavioral16
Sample
memez-master/memez/memez.rc
Resource
win10-20230220-en
Behavioral task
behavioral17
Sample
memez-master/memez/memez.xml
Resource
win7-20230220-en
Behavioral task
behavioral18
Sample
memez-master/memez/memez.xml
Resource
win10-20230220-en
Behavioral task
behavioral19
Sample
memez-master/memez/memez.vcxproj.filters
Resource
win7-20230220-en
Behavioral task
behavioral20
Sample
memez-master/memez/memez.vcxproj.filters
Resource
win10-20230220-en
Behavioral task
behavioral21
Sample
memez-master/memez/resource.h
Resource
win7-20230220-en
Behavioral task
behavioral22
Sample
memez-master/memez/resource.h
Resource
win10-20230220-en
General
-
Target
memez-master/memez/memez.cpp
-
Size
8KB
-
MD5
44c6da2824fcea8f211ea33f5c9d2927
-
SHA1
829dc73e7cfece7be5120e06c4954f95d72be74b
-
SHA256
ca17b070f5db499a59aa7e6e22a5661b8d2f9a2d063cb2818790ce5ee3d96466
-
SHA512
8f310fed36e87ed745f6f6edd5bcf406d77d5e7c37cf2c1dcb2b34cbc17f8be43e7927cefbb6d9567854593a70492b120dce8369fab470fd7d2a18b7d0cafda9
-
SSDEEP
192:OYUzG9L3MfVBLB2AAk1XnS3QKknhwzOazuHchHHcBJaKi:WWL3GBLB2AFXnS3QKknOzOaxhH8BJaKi
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 12 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\cpp_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\.cpp rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\cpp_auto_file\shell\edit rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\cpp_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\cpp_auto_file\shell\edit\command\ = "%SystemRoot%\\system32\\NOTEPAD.EXE %1" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\cpp_auto_file\shell\open\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\cpp_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\.cpp\ = "cpp_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\cpp_auto_file\shell\edit\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\cpp_auto_file\shell\open rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\cpp_auto_file\shell\open\command\ = "%SystemRoot%\\system32\\NOTEPAD.EXE %1" rundll32.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 860 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 860 AUDIODG.EXE Token: 33 860 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 860 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1736 wrote to memory of 580 1736 cmd.exe 29 PID 1736 wrote to memory of 580 1736 cmd.exe 29 PID 1736 wrote to memory of 580 1736 cmd.exe 29 PID 580 wrote to memory of 1440 580 rundll32.exe 30 PID 580 wrote to memory of 1440 580 rundll32.exe 30 PID 580 wrote to memory of 1440 580 rundll32.exe 30 PID 1520 wrote to memory of 632 1520 wmplayer.exe 35 PID 1520 wrote to memory of 632 1520 wmplayer.exe 35 PID 1520 wrote to memory of 632 1520 wmplayer.exe 35 PID 1520 wrote to memory of 632 1520 wmplayer.exe 35 PID 1520 wrote to memory of 632 1520 wmplayer.exe 35 PID 1520 wrote to memory of 632 1520 wmplayer.exe 35 PID 1520 wrote to memory of 632 1520 wmplayer.exe 35
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\memez-master\memez\memez.cpp1⤵
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\memez-master\memez\memez.cpp2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\memez-master\memez\memez.cpp3⤵PID:1440
-
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1772
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:11⤵
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Program Files (x86)\Windows Media Player\setup_wm.exe"C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:12⤵PID:632
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5441⤵
- Suspicious use of AdjustPrivilegeToken
PID:860