Overview
overview
10Static
static
3eeeeeeeeee...00.exe
windows7-x64
eeeeeeeeee...00.exe
windows10-2004-x64
eeeeeeeeee...um.exe
windows7-x64
10eeeeeeeeee...um.exe
windows10-2004-x64
10eeeeeeeeee...ug.exe
windows7-x64
6eeeeeeeeee...ug.exe
windows10-2004-x64
6eeeeeeeeee...le.exe
windows7-x64
1eeeeeeeeee...le.exe
windows10-2004-x64
1eeeeeeeeee...er.exe
windows7-x64
7eeeeeeeeee...er.exe
windows10-2004-x64
7eeeeeeeeee...us.exe
windows7-x64
1eeeeeeeeee...us.exe
windows10-2004-x64
1MEMZ 3.0/MEMZ.bat
windows7-x64
7MEMZ 3.0/MEMZ.bat
windows10-2004-x64
7MEMZ 3.0/MEMZ.exe
windows7-x64
6MEMZ 3.0/MEMZ.exe
windows10-2004-x64
7eeeeeeeeee...MZ.bat
windows7-x64
7eeeeeeeeee...MZ.bat
windows10-2004-x64
7eeeeeeeeee...MZ.exe
windows7-x64
6eeeeeeeeee...MZ.exe
windows10-2004-x64
7eeeeeeeeee...ld.exe
windows7-x64
7eeeeeeeeee...ld.exe
windows10-2004-x64
7eeeeeeeeee....A.exe
windows7-x64
6eeeeeeeeee....A.exe
windows10-2004-x64
6eeeeeeeeee...al.exe
windows7-x64
7eeeeeeeeee...al.exe
windows10-2004-x64
8eeeeeeeeee...15.exe
windows7-x64
3eeeeeeeeee...15.exe
windows10-2004-x64
3eeeeeeeeee...al.exe
windows7-x64
7eeeeeeeeee...al.exe
windows10-2004-x64
8eeeeeeeeee...0r.exe
windows7-x64
10eeeeeeeeee...0r.exe
windows10-2004-x64
10Analysis
-
max time kernel
344s -
max time network
320s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-03-2024 21:59
Static task
static1
Behavioral task
behavioral1
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/000/[email protected]
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/000/[email protected]
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/Antivirus Platinum/[email protected]
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/Antivirus Platinum/[email protected]
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/ColorBug/[email protected]
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/ColorBug/[email protected]
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/DesktopPuzzle/[email protected]
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/DesktopPuzzle/[email protected]
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/FakeActivation/[email protected]
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/FakeActivation/[email protected]
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/Happy Antivirus/[email protected]
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/Happy Antivirus/[email protected]
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
MEMZ 3.0/MEMZ.bat
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
MEMZ 3.0/MEMZ.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
MEMZ 3.0/MEMZ.exe
Resource
win7-20240215-en
Behavioral task
behavioral16
Sample
MEMZ 3.0/MEMZ.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/MEMZ 3.0 (1)/MEMZ 3.0/MEMZ.bat
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/MEMZ 3.0 (1)/MEMZ 3.0/MEMZ.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/MEMZ 3.0 (1)/MEMZ 3.0/MEMZ.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/MEMZ 3.0 (1)/MEMZ 3.0/MEMZ.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/NavaShield/[email protected]
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/NavaShield/[email protected]
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/Petya.A/[email protected]
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/Petya.A/[email protected]
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/Security Central/[email protected]
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/Security Central/[email protected]
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/Security Defender 2015/[email protected]
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/Security Defender 2015/[email protected]
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/VineMEMZ-Original.exe
Resource
win7-20240220-en
Behavioral task
behavioral30
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/VineMEMZ-Original.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/WannaCrypt0r/[email protected]
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/WannaCrypt0r/[email protected]
Resource
win10v2004-20240226-en
General
-
Target
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/Security Central/[email protected]
-
Size
904KB
-
MD5
0315c3149c7dc1d865dc5a89043d870d
-
SHA1
f74546dda99891ca688416b1a61c9637b3794108
-
SHA256
90c2c3944fa8933eefc699cf590ed836086deb31ee56ec71b5651fd978a352c9
-
SHA512
7168dc244f0e400fa302801078e3faec8cdd2d3cb3b8baaab0a1b3c0929d7cf41e54bfbe530ad5ce96a6b63761f7866d26aaae788c3138c34294174091478112
-
SSDEEP
24576:bnQv6Dyxn2Qx0KHizHWKxHuyCcZFyXR1tG:2OE2QtCzhh/7R
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
Security Central.exeSecurity Central.exepid process 1212 Security Central.exe 1444 Security Central.exe -
Loads dropped DLL 4 IoCs
Processes:
[email protected]Security Central.exepid process 2352 [email protected] 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral25/memory/2352-2-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral25/memory/2352-4-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral25/memory/2352-5-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral25/memory/2352-18-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral25/memory/1444-23-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral25/memory/1444-24-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral25/memory/1444-25-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral25/memory/1444-33-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral25/memory/1444-34-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral25/memory/1444-35-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral25/memory/1444-36-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral25/memory/1444-39-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral25/memory/1444-40-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral25/memory/1444-41-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral25/memory/1444-42-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral25/memory/1444-43-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral25/memory/1444-44-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral25/memory/1444-45-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral25/memory/1444-46-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral25/memory/1444-47-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral25/memory/1444-48-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral25/memory/1444-49-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral25/memory/1444-50-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral25/memory/1444-51-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral25/memory/1444-52-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral25/memory/1444-53-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral25/memory/1444-54-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral25/memory/1444-55-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral25/memory/1444-56-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral25/memory/1444-57-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral25/memory/1444-58-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral25/memory/1444-59-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral25/memory/1444-60-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral25/memory/1444-61-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral25/memory/1444-62-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral25/memory/1444-63-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral25/memory/1444-64-0x0000000000400000-0x0000000000A35000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Security Central.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Security Central = "C:\\Program Files (x86)\\Security Central\\Security Central.exe" Security Central.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
Security Central.exedescription ioc process File opened (read-only) \??\I: Security Central.exe File opened (read-only) \??\Q: Security Central.exe File opened (read-only) \??\R: Security Central.exe File opened (read-only) \??\S: Security Central.exe File opened (read-only) \??\X: Security Central.exe File opened (read-only) \??\Y: Security Central.exe File opened (read-only) \??\G: Security Central.exe File opened (read-only) \??\H: Security Central.exe File opened (read-only) \??\K: Security Central.exe File opened (read-only) \??\N: Security Central.exe File opened (read-only) \??\O: Security Central.exe File opened (read-only) \??\P: Security Central.exe File opened (read-only) \??\U: Security Central.exe File opened (read-only) \??\J: Security Central.exe File opened (read-only) \??\L: Security Central.exe File opened (read-only) \??\M: Security Central.exe File opened (read-only) \??\V: Security Central.exe File opened (read-only) \??\W: Security Central.exe File opened (read-only) \??\Z: Security Central.exe File opened (read-only) \??\E: Security Central.exe File opened (read-only) \??\T: Security Central.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
[email protected]Security Central.exedescription pid process target process PID 2724 set thread context of 2352 2724 [email protected] [email protected] PID 1212 set thread context of 1444 1212 Security Central.exe Security Central.exe -
Drops file in Program Files directory 1 IoCs
Processes:
description ioc process File created C:\Program Files (x86)\Security Central\Security Central.exe [email protected] -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Security Central.exepid process 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Security Central.exepid process 1444 Security Central.exe -
Suspicious use of FindShellTrayWindow 11 IoCs
Processes:
Security Central.exepid process 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe -
Suspicious use of SendNotifyMessage 11 IoCs
Processes:
Security Central.exepid process 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
pid process 2724 [email protected] 1212 Security Central.exe 1444 Security Central.exe 1444 Security Central.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
description pid process target process PID 2724 wrote to memory of 2352 2724 [email protected] [email protected] PID 2724 wrote to memory of 2352 2724 [email protected] [email protected] PID 2724 wrote to memory of 2352 2724 [email protected] [email protected] PID 2724 wrote to memory of 2352 2724 [email protected] [email protected] PID 2724 wrote to memory of 2352 2724 [email protected] [email protected] PID 2724 wrote to memory of 2352 2724 [email protected] [email protected] PID 2724 wrote to memory of 2352 2724 [email protected] [email protected] PID 2724 wrote to memory of 2352 2724 [email protected] [email protected] PID 2724 wrote to memory of 2352 2724 [email protected] [email protected] PID 2352 wrote to memory of 1212 2352 [email protected] Security Central.exe PID 2352 wrote to memory of 1212 2352 [email protected] Security Central.exe PID 2352 wrote to memory of 1212 2352 [email protected] Security Central.exe PID 2352 wrote to memory of 1212 2352 [email protected] Security Central.exe PID 1212 wrote to memory of 1444 1212 Security Central.exe Security Central.exe PID 1212 wrote to memory of 1444 1212 Security Central.exe Security Central.exe PID 1212 wrote to memory of 1444 1212 Security Central.exe Security Central.exe PID 1212 wrote to memory of 1444 1212 Security Central.exe Security Central.exe PID 1212 wrote to memory of 1444 1212 Security Central.exe Security Central.exe PID 1212 wrote to memory of 1444 1212 Security Central.exe Security Central.exe PID 1212 wrote to memory of 1444 1212 Security Central.exe Security Central.exe PID 1212 wrote to memory of 1444 1212 Security Central.exe Security Central.exe PID 1212 wrote to memory of 1444 1212 Security Central.exe Security Central.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\eeeeeeeeeeeeee\Malware_pack_2\Malware_pack_2\Security Central\[email protected]"C:\Users\Admin\AppData\Local\Temp\eeeeeeeeeeeeee\Malware_pack_2\Malware_pack_2\Security Central\[email protected]"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\eeeeeeeeeeeeee\Malware_pack_2\Malware_pack_2\Security Central\[email protected]"C:\Users\Admin\AppData\Local\Temp\eeeeeeeeeeeeee\Malware_pack_2\Malware_pack_2\Security Central\[email protected]"2⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Program Files (x86)\Security Central\Security Central.exe"C:\Program Files (x86)\Security Central\Security Central.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Program Files (x86)\Security Central\Security Central.exe"C:\Program Files (x86)\Security Central\Security Central.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1444
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
904KB
MD50315c3149c7dc1d865dc5a89043d870d
SHA1f74546dda99891ca688416b1a61c9637b3794108
SHA25690c2c3944fa8933eefc699cf590ed836086deb31ee56ec71b5651fd978a352c9
SHA5127168dc244f0e400fa302801078e3faec8cdd2d3cb3b8baaab0a1b3c0929d7cf41e54bfbe530ad5ce96a6b63761f7866d26aaae788c3138c34294174091478112
-
Filesize
128KB
MD59429768964bd07953c1753f632494e7c
SHA172408e7e2c8ef4078298c8bd0eef3ea883d74b07
SHA2561db2fa21ea97373809bcfb831653e8fda0d561d7b44974020390aedf054c9ffb
SHA512a35c5276b70484a95f780d81746ffdc547f550ef15ab6e06ae8fde94a69a06efb9415e64938fc056d39ecef093dfef65d03e5b3fb8a8d0c5c7b912e409ddb5ab
-
Filesize
704KB
MD5c4a5e1c56f3d0ac2e8769c5804cf7716
SHA112044d2e8166c03ada750308389c42e1ec400ed0
SHA2568fc82eb9a4b47a5a41f12be86d369da616e33b6d2ed7b61b01f8c3b1add0793d
SHA5126bcf642aa14dca8982608b97ffb442a77e8761afce1389da8286f09b7b02eb94e879ebae6b97982bc9c540e0601c0820b852ea5eca5ec918712af77b19898565