Overview
overview
7Static
static
3MEMZ-Destructive.bat
windows7-x64
7MEMZ-Destructive.bat
windows10-1703-x64
7MEMZ-Destructive.bat
windows10-2004-x64
7MEMZ-Destructive.bat
windows11-21h2-x64
7MEMZ-Destructive.exe
windows7-x64
6MEMZ-Destructive.exe
windows10-1703-x64
7MEMZ-Destructive.exe
windows10-2004-x64
7MEMZ-Destructive.exe
windows11-21h2-x64
6Static task
static1
Behavioral task
behavioral1
Sample
MEMZ-Destructive.bat
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
MEMZ-Destructive.bat
Resource
win10-20240221-en
Behavioral task
behavioral3
Sample
MEMZ-Destructive.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
MEMZ-Destructive.bat
Resource
win11-20240214-en
Behavioral task
behavioral5
Sample
MEMZ-Destructive.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
MEMZ-Destructive.exe
Resource
win10-20240221-en
Behavioral task
behavioral7
Sample
MEMZ-Destructive.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral8
Sample
MEMZ-Destructive.exe
Resource
win11-20240221-en
General
-
Target
MEMZ-Destructive.7z
-
Size
17KB
-
MD5
d91a65636b8d4b7437983e064e2580fa
-
SHA1
2bfaf387d22b7e9c1a54c35d8ab33fa84006ece3
-
SHA256
c547f9193b8fcb681dbb93968d54ac9912901097e1912ff7ad11c5a9ee13062c
-
SHA512
0175a90f980354b6f9a0fb66be6672c18c03a33fb547a0a16d159f18745f59fc5f4d9dae69dfd4d3bcffbc1bd3bbc73901000931dc3c12b70dde6e4e72a92f9f
-
SSDEEP
384:CxpNbARMGzvkdrUUAhybY4GfheFQb4M4ecf3iQ/FF87u20VoDWXeQT:Cxp6RLzMtUUVMsFQb4ycfiQ/o10XeQT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/MEMZ-Destructive.exe
Files
-
MEMZ-Destructive.7z.7z
Password: DYG-Q5ntBT?JmezjzY[(jn2T(65f5(-4
-
MEMZ-Destructive.bat.bat .vbs
-
MEMZ-Destructive.exe.exe windows:5 windows x86 arch:x86
Password: DYG-Q5ntBT?JmezjzY[(jn2T(65f5(-4
52753d226ff5a8a88caf9829928cd5d1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteFile
CloseHandle
lstrcmpA
lstrcmpW
LoadLibraryA
GetModuleFileNameW
GetCommandLineW
Sleep
SetPriorityClass
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GlobalAlloc
GlobalFree
lstrlenW
GetCurrentThreadId
CreateThread
ExitProcess
GetCurrentProcess
OpenProcess
LocalFree
LocalAlloc
CreateFileA
GetProcAddress
user32
GetWindowRect
MessageBoxW
SetCursorPos
GetCursorPos
GetDesktopWindow
EnumChildWindows
CallNextHookEx
LoadIconW
ReleaseDC
UnhookWindowsHookEx
MessageBoxA
GetSystemMetrics
CreateWindowExA
RegisterClassExA
DefWindowProcW
ExitWindowsEx
DispatchMessageW
TranslateMessage
GetWindowDC
DrawIcon
SendInput
SendMessageTimeoutW
GetMessageW
SetWindowsHookExW
gdi32
BitBlt
StretchBlt
advapi32
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueW
CryptAcquireContextW
CryptGenRandom
shell32
CommandLineToArgvW
ShellExecuteW
ShellExecuteA
ShellExecuteExW
winmm
PlaySoundA
psapi
GetProcessImageFileNameA
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 404B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 524B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ