Overview
overview
7Static
static
3MEMZ Safe Payload.zip
windows10-2004-x64
7MEMZ Safe ...ell.py
windows10-2004-x64
3MEMZ Safe ...ors.py
windows10-2004-x64
3MEMZ Safe ...ert.py
windows10-2004-x64
3MEMZ Safe ...oo.exe
windows10-2004-x64
7MEMZ Safe ...een.py
windows10-2004-x64
3MEMZ Safe ...ell.py
windows10-2004-x64
3MEMZ Safe ...le.wav
windows10-2004-x64
6MEMZ Safe ...Zoo.py
windows10-2004-x64
3MEMZ Safe ...ion.py
windows10-2004-x64
3MEMZ Safe ...oid.py
windows10-2004-x64
3MEMZ Safe ...ves.py
windows10-2004-x64
3Analysis
-
max time kernel
1590s -
max time network
1776s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
24/04/2024, 19:59
Behavioral task
behavioral1
Sample
MEMZ Safe Payload.zip
Resource
win10v2004-20240412-en
Behavioral task
behavioral2
Sample
MEMZ Safe Payload/bwhell.py
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
MEMZ Safe Payload/errors.py
Resource
win10v2004-20240412-en
Behavioral task
behavioral4
Sample
MEMZ Safe Payload/invert.py
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
MEMZ Safe Payload/output/theZoo.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral6
Sample
MEMZ Safe Payload/panscreen.py
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
MEMZ Safe Payload/rainbowhell.py
Resource
win10v2004-20240412-en
Behavioral task
behavioral8
Sample
MEMZ Safe Payload/soundfile.wav
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
MEMZ Safe Payload/theZoo.py
Resource
win10v2004-20240412-en
Behavioral task
behavioral10
Sample
MEMZ Safe Payload/theZooHellEdition.py
Resource
win10v2004-20240412-en
Behavioral task
behavioral11
Sample
MEMZ Safe Payload/void.py
Resource
win10v2004-20240412-en
Behavioral task
behavioral12
Sample
MEMZ Safe Payload/waves.py
Resource
win10v2004-20240412-en
General
-
Target
MEMZ Safe Payload/soundfile.wav
-
Size
6.2MB
-
MD5
efc6e6214dd1c293dd4ff181013852a4
-
SHA1
11e608f87bde0bc8abf8e070966145ba80d025b9
-
SHA256
78f096f8aad74defda542e40ccd235753b141ce3828d56459d07af8b8b2211c9
-
SHA512
059d4d26643fcc23fe74d42168be837645fd9cfd1f4bc7438774b51059ef63f9710fae5dd10a88f7b7d3c3c184c77224d39cba9d8ce8896a9a20215dfe384e65
-
SSDEEP
98304:C4JsOIwCRs/fcFCqBZi9hAmsBhfOiWiEX2H/8QWbV0lAVk5loqbIb2T:C4KOIzRsyCEYTqWiWrQ/Ak5loqbIb2T
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeShutdownPrivilege 2164 unregmp2.exe Token: SeCreatePagefilePrivilege 2164 unregmp2.exe Token: SeManageVolumePrivilege 2636 svchost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4484 wrote to memory of 3796 4484 wmplayer.exe 84 PID 4484 wrote to memory of 3796 4484 wmplayer.exe 84 PID 4484 wrote to memory of 3796 4484 wmplayer.exe 84 PID 4484 wrote to memory of 1244 4484 wmplayer.exe 85 PID 4484 wrote to memory of 1244 4484 wmplayer.exe 85 PID 4484 wrote to memory of 1244 4484 wmplayer.exe 85 PID 1244 wrote to memory of 2164 1244 unregmp2.exe 87 PID 1244 wrote to memory of 2164 1244 unregmp2.exe 87
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Open "C:\Users\Admin\AppData\Local\Temp\MEMZ Safe Payload\soundfile.wav"1⤵
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Program Files (x86)\Windows Media Player\setup_wm.exe"C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Open "C:\Users\Admin\AppData\Local\Temp\MEMZ Safe Payload\soundfile.wav"2⤵PID:3796
-
-
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:2164
-
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:2696
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2636
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5987a07b978cfe12e4ce45e513ef86619
SHA122eec9a9b2e83ad33bedc59e3205f86590b7d40c
SHA256f1a4a978ce1c4731df1594043135cf58d084fdf129dd1c8e4507c9e06eac5ea8
SHA51239b86540e4d35c84609ef66537b5aa02058e3d4293f902127c7d4eac8ffc65920cb5c69a77552fc085687eed66e38367f83c177046d0ecb8e6d135463cc142aa
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD56c7daa164ab2c5698d8e0e9c9f3e59fa
SHA1a39c7b1fab4892eb15ddb5b662652fef9f2959d8
SHA2566384285e89a223dfb536b614db0e04e47ff1440d05301edc508699d8158e1b49
SHA512a5c39b02e6b1c5682a1551eed32ede414d6c798f6a96b1253011ffb1df84fa7ed2e00e747ab7212cc5f097ac8d7f98408a5ccec8c0895f23b29e5272ea1d7e0a