Overview
overview
7Static
static
3MEMZ Safe Payload.zip
windows10-2004-x64
7MEMZ Safe ...ell.py
windows10-2004-x64
3MEMZ Safe ...ors.py
windows10-2004-x64
3MEMZ Safe ...ert.py
windows10-2004-x64
3MEMZ Safe ...oo.exe
windows10-2004-x64
7MEMZ Safe ...een.py
windows10-2004-x64
3MEMZ Safe ...ell.py
windows10-2004-x64
3MEMZ Safe ...le.wav
windows10-2004-x64
6MEMZ Safe ...Zoo.py
windows10-2004-x64
3MEMZ Safe ...ion.py
windows10-2004-x64
3MEMZ Safe ...oid.py
windows10-2004-x64
3MEMZ Safe ...ves.py
windows10-2004-x64
3Analysis
-
max time kernel
1709s -
max time network
1800s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
24/04/2024, 19:59
Behavioral task
behavioral1
Sample
MEMZ Safe Payload.zip
Resource
win10v2004-20240412-en
Behavioral task
behavioral2
Sample
MEMZ Safe Payload/bwhell.py
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
MEMZ Safe Payload/errors.py
Resource
win10v2004-20240412-en
Behavioral task
behavioral4
Sample
MEMZ Safe Payload/invert.py
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
MEMZ Safe Payload/output/theZoo.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral6
Sample
MEMZ Safe Payload/panscreen.py
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
MEMZ Safe Payload/rainbowhell.py
Resource
win10v2004-20240412-en
Behavioral task
behavioral8
Sample
MEMZ Safe Payload/soundfile.wav
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
MEMZ Safe Payload/theZoo.py
Resource
win10v2004-20240412-en
Behavioral task
behavioral10
Sample
MEMZ Safe Payload/theZooHellEdition.py
Resource
win10v2004-20240412-en
Behavioral task
behavioral11
Sample
MEMZ Safe Payload/void.py
Resource
win10v2004-20240412-en
Behavioral task
behavioral12
Sample
MEMZ Safe Payload/waves.py
Resource
win10v2004-20240412-en
General
-
Target
MEMZ Safe Payload/theZoo.py
-
Size
2KB
-
MD5
f9ebdc47acd7d97298f6034d762826f7
-
SHA1
87b424968c6bb0f6412e513632bf582edf63e753
-
SHA256
5db7ce70619a096da0d19e5046d1021fd58f199219e470880064a44004b338ad
-
SHA512
eb6715ed8a4bb7b77d6756dd9307c8cdc9afc09d8ea709a5dcfc205e9196b3973f351ec7426d59c896afb75e1a0c98a691dac34436c229fb4a9e671c2a9bad69
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2300 OpenWith.exe -
Suspicious use of SetWindowsHookEx 37 IoCs
pid Process 2300 OpenWith.exe 2300 OpenWith.exe 2300 OpenWith.exe 2300 OpenWith.exe 2300 OpenWith.exe 2300 OpenWith.exe 2300 OpenWith.exe 2300 OpenWith.exe 2300 OpenWith.exe 2300 OpenWith.exe 2300 OpenWith.exe 2300 OpenWith.exe 2300 OpenWith.exe 2300 OpenWith.exe 2300 OpenWith.exe 2300 OpenWith.exe 2300 OpenWith.exe 2300 OpenWith.exe 2300 OpenWith.exe 2300 OpenWith.exe 2300 OpenWith.exe 2300 OpenWith.exe 2300 OpenWith.exe 2300 OpenWith.exe 2300 OpenWith.exe 2300 OpenWith.exe 2300 OpenWith.exe 2300 OpenWith.exe 2300 OpenWith.exe 2300 OpenWith.exe 2300 OpenWith.exe 2300 OpenWith.exe 2300 OpenWith.exe 2300 OpenWith.exe 2300 OpenWith.exe 2300 OpenWith.exe 2300 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\MEMZ Safe Payload\theZoo.py"1⤵
- Modifies registry class
PID:3880
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2300