Resubmissions

08-06-2024 08:50

240608-krvyesae91 10

08-05-2024 16:15

240508-tqnx6ach3w 10

08-05-2024 16:07

240508-tkr3mafa54 10

01-05-2024 18:02

240501-wmf49acg3s 6

27-04-2024 08:46

240427-kpfeysff8s 10

25-04-2024 21:25

240425-z9y55afb7v 10

25-04-2024 21:16

240425-z4pphafa97 10

25-04-2024 18:27

240425-w3929sde33 10

25-04-2024 18:17

240425-ww4a5sdc8x 10

Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25-04-2024 18:14

General

  • Target

    Memz.exe

  • Size

    14KB

  • MD5

    19dbec50735b5f2a72d4199c4e184960

  • SHA1

    6fed7732f7cb6f59743795b2ab154a3676f4c822

  • SHA256

    a3d5715a81f2fbeb5f76c88c9c21eeee87142909716472f911ff6950c790c24d

  • SHA512

    aa8a6bbb1ec516d5d5acf8be6863a4c6c5d754cee12b3d374c3a6acb393376806edc422f0ffb661c210e5b9485da88521e4a0956a4b7b08a5467cfaacd90591d

  • SSDEEP

    192:sIvxdXSQeWSg9JJS/lcIEiwqZKBkDFR43xWTM3LHn8f26gyr6yfFCj3r:sMVSaSEglcIqq3agmLc+6gyWqFCj

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 22 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Memz.exe
    "C:\Users\Admin\AppData\Local\Temp\Memz.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2288
    • C:\Users\Admin\AppData\Local\Temp\Memz.exe
      "C:\Users\Admin\AppData\Local\Temp\Memz.exe" /watchdog
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2484
    • C:\Users\Admin\AppData\Local\Temp\Memz.exe
      "C:\Users\Admin\AppData\Local\Temp\Memz.exe" /watchdog
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2976
    • C:\Users\Admin\AppData\Local\Temp\Memz.exe
      "C:\Users\Admin\AppData\Local\Temp\Memz.exe" /watchdog
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2532
    • C:\Users\Admin\AppData\Local\Temp\Memz.exe
      "C:\Users\Admin\AppData\Local\Temp\Memz.exe" /watchdog
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2496
    • C:\Users\Admin\AppData\Local\Temp\Memz.exe
      "C:\Users\Admin\AppData\Local\Temp\Memz.exe" /watchdog
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2596
    • C:\Users\Admin\AppData\Local\Temp\Memz.exe
      "C:\Users\Admin\AppData\Local\Temp\Memz.exe" /main
      2⤵
      • Writes to the Master Boot Record (MBR)
      • Suspicious use of WriteProcessMemory
      PID:2684
      • C:\Windows\SysWOW64\notepad.exe
        "C:\Windows\System32\notepad.exe" \note.txt
        3⤵
          PID:2540
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" http://google.co.ck/search?q=virus.exe
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2180
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2180 CREDAT:275457 /prefetch:2
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1372
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2180 CREDAT:537613 /prefetch:2
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2560
        • C:\Windows\SysWOW64\mmc.exe
          "C:\Windows\System32\mmc.exe"
          3⤵
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1616
          • C:\Windows\system32\mmc.exe
            "C:\Windows\system32\mmc.exe"
            4⤵
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:708
        • C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe
          "C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe"
          3⤵
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:640
          • C:\Windows\splwow64.exe
            C:\Windows\splwow64.exe 12288
            4⤵
              PID:1844
          • C:\Windows\SysWOW64\mspaint.exe
            "C:\Windows\System32\mspaint.exe"
            3⤵
            • Drops file in Windows directory
            • Suspicious use of SetWindowsHookEx
            PID:2024
      • C:\Windows\system32\AUDIODG.EXE
        C:\Windows\system32\AUDIODG.EXE 0x1ec
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1968

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

        Filesize

        914B

        MD5

        e4a68ac854ac5242460afd72481b2a44

        SHA1

        df3c24f9bfd666761b268073fe06d1cc8d4f82a4

        SHA256

        cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

        SHA512

        5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

        Filesize

        1KB

        MD5

        a266bb7dcc38a562631361bbf61dd11b

        SHA1

        3b1efd3a66ea28b16697394703a72ca340a05bd5

        SHA256

        df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

        SHA512

        0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

        Filesize

        252B

        MD5

        26202b29cbd96f471fb231568c47830c

        SHA1

        c2885ee1ac385f7aa8d2e021e720a39c549f4435

        SHA256

        0acd1be7f5733975408446dc08ec5c0037f767926534ce882a1c6e45211a6bf9

        SHA512

        f0089c62c6ca63c8409aa9d3bf7f5b322bb06199e906637e42ec1e924e494bc1f93cab4da1115a92bd66b150ef7bb83a4b14336d98cd24402cd83b721db350c8

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        5af56937cb4064193429458d346103c0

        SHA1

        af314c4618f6f051ea53f9771d02eaf3bd7a27ee

        SHA256

        78987fd4b4727d784dd7fb1217f41e5e0acb49d7fbc19feb009ec4acd8864d8d

        SHA512

        8c26d993aec6b3cdb9bc8893abfad8faf7d01c82442977a4bd8d3a61e830d969715ee29dd033c9ae2b2ec8fdd0bd95b6464e1fa249e74ddfdb868c1d98b293c1

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        07e8628de7fe7c80a19144e2883ce2f1

        SHA1

        326f349bf36f3c0b76a992adf0dcda74354a54f4

        SHA256

        523a069472e6e471ab14e93326eb4433fb4ef3ace37c1b9482a1d7f9fa3aebba

        SHA512

        8b2316e1dbf2d84415e5ec86d77be9f1b90d1a81148558bebbc6678a7699acd99f5bad382adfe6f5bd0f2af883f99f846ebe7bb72cfd90b82f7d654e391d2943

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        b3d962f3c49f1ec422ccfd7a88d311c7

        SHA1

        ed9337d93276403920363eff6be00f1102737717

        SHA256

        991505c08ff7bc175e8f0dc8eb528c9f045bf711f456477d44ef948c05d6644b

        SHA512

        1ffd407f5e43301d3f40650061a1dc4c57d91a4a96c63d4d1cbe036e8de2076105812910a57bd1128bfb87f03ad9b15954fe0eab4dc3137f7cc1f6746b64c309

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        7a11be0e6e00c6a892bd5f18411ec34b

        SHA1

        286ba8d75f7edbae2c176cd62ecaccfe8d9ccbad

        SHA256

        a215dc70214c56994ca37034c1c690228716d631058a7a54b75e0d3ab6ff4e63

        SHA512

        c6d445b8dee2561e9fe485fe32dc6dbbd62e13c1de67dc488c6ba8a436d4fe3e45da59fdbc80e35f3a4b40b3f1380030804cb9b8bfc627ea10b7f1c7f7571c91

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        8df31afb1635ef8770de5a63aaec20d8

        SHA1

        92dfc246e4e0b87d5c12122fad070bb7c5b11b44

        SHA256

        83ce3aaca8057d3c71c5ca4c22457f57c7c926de3a1364453acb4689e3d399ef

        SHA512

        1429e90503163fc53ec54230354506c475d8c3754e9af67a822ba85e6752303b04a33d138929192f097590854a38b55fa75c672f1692930ab959a7e4c25f723d

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        e243c6f1614ef7119c83b68ae22d7a41

        SHA1

        8768a2a50eb7ea004f1aef9f391ab7a2abd5f762

        SHA256

        26d07848135c6821ea25dfbd5a01fbbd1e7898b78b752b0653fa0e4be54c854a

        SHA512

        79b4ae0d9b471348ba416cb3aa9df27cd8fe875437a70b02d1e083be754611145503f45d095d1408cd5a932b2c458cbfd5414c88796b6fb4043208c80448e5ef

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        d8904103ed702af20aa5bd50a500797a

        SHA1

        081437461d31c2d29dc87984c50ce63a3ce3d4b4

        SHA256

        764fe3e35f96abd891b73eeb5f849a639c11f1344230b118cb4cb0df52542313

        SHA512

        c8bb2e82bb9819f2d698b62b3eeefbeec5d160781d5802734a562ca7a8d1b1b9ab1e45f1a6a8bd276a74a98bc78e1430ee6805f08c4a9d46a96ebc5ce1646cd7

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        5d225e789705e9c51f00a19f01f5e9c7

        SHA1

        c45bf12759c799b5d182715da9677828c80d0aa9

        SHA256

        737faab9133ff923770073d126bd6d7a10691a83fe1080fe6fd509518ff86271

        SHA512

        d7d790dc358deb4f4dd5fc9d719a25f94ffbb92eef55d3af4dbc1da87b250059ceb4384cb9e1e865cebefbb14b407b3baf728cf133b55dd30d8d14104813bdbb

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        e8ffd4318dd1631de38fa18e83975e9f

        SHA1

        8256b9cb889ab9faff7ea5d6057e15154e9638f8

        SHA256

        b195454717dcfbc40e61fab7495996122852792e9562219cdd4505717118a9ba

        SHA512

        239a0a4fb6d837b4a3e3f67a1a9efa7a886bd36c8896c62493b12a8c8b446502342c0d7ef2137b832cbf307ac750a1eed1fa171e8635d753d1c916dc63cff1a6

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        8c35cb6a48a652b2238e26706d2f15e4

        SHA1

        a6c9809a55b3c49085f4cfbc3c1286d3f84279d7

        SHA256

        382cdfd6796b1d2858b87b4ec90d2726ee64b2f94c20f6e35bc02bbf6b20d7f8

        SHA512

        90a4c4c853f045e8b2fca0400147ecb61e819b3025082237f459994cfb595d0d5eab682b73620f465c3b0221835ba562f413caa3250715bf93e7e99eddd32f0a

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

        Filesize

        242B

        MD5

        df30d380ecc8f075a2fcce5df6d61eba

        SHA1

        069a939a1f531999d7396a762a331e26671cdf1d

        SHA256

        1241d18ce26e5eca24f25af452ae9ca48dc08983bbb6f80acde74aef58f8dce3

        SHA512

        389f2ae8623391bd92b80baabb5fc0c00a26b1aec7295e36c27ae7e49af7f6626eb876f50d77a2fbf49afc11afbd39ed385391730f09a4e1e00e91d50ea6b8f1

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\sxsuh4u\imagestore.dat

        Filesize

        5KB

        MD5

        99a0fcf0ce36d7df1c114b71d535307c

        SHA1

        ab2401fd88df7caf4144c5ab4650843733c80b74

        SHA256

        a67c8a7f0a4c2e402fa750ba8d78c3e046b6524d41dde84b81dd62aacf4f3e7a

        SHA512

        8c1d1dd957ab599c82310163e84d616058259afb55a16929621556436ca28c0edd595f935c7709f8c72ab19cbad3eb6d3129176b4dc4b3c0cdb985de5e57c7d2

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3NPBB818\favicon[1].ico

        Filesize

        5KB

        MD5

        f3418a443e7d841097c714d69ec4bcb8

        SHA1

        49263695f6b0cdd72f45cf1b775e660fdc36c606

        SHA256

        6da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770

        SHA512

        82d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563

      • C:\Users\Admin\AppData\Local\Temp\CabDEFB.tmp

        Filesize

        65KB

        MD5

        ac05d27423a85adc1622c714f2cb6184

        SHA1

        b0fe2b1abddb97837ea0195be70ab2ff14d43198

        SHA256

        c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

        SHA512

        6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

      • C:\Users\Admin\AppData\Local\Temp\CabDFC9.tmp

        Filesize

        68KB

        MD5

        29f65ba8e88c063813cc50a4ea544e93

        SHA1

        05a7040d5c127e68c25d81cc51271ffb8bef3568

        SHA256

        1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

        SHA512

        e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

      • C:\Users\Admin\AppData\Local\Temp\TarDEFE.tmp

        Filesize

        171KB

        MD5

        9c0c641c06238516f27941aa1166d427

        SHA1

        64cd549fb8cf014fcd9312aa7a5b023847b6c977

        SHA256

        4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

        SHA512

        936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

      • C:\Users\Admin\AppData\Local\Temp\TarDFEE.tmp

        Filesize

        177KB

        MD5

        435a9ac180383f9fa094131b173a2f7b

        SHA1

        76944ea657a9db94f9a4bef38f88c46ed4166983

        SHA256

        67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

        SHA512

        1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

      • C:\note.txt

        Filesize

        218B

        MD5

        afa6955439b8d516721231029fb9ca1b

        SHA1

        087a043cc123c0c0df2ffadcf8e71e3ac86bbae9

        SHA256

        8e9f20f6864c66576536c0b866c6ffdcf11397db67fe120e972e244c3c022270

        SHA512

        5da21a31fbc4e8250dffed30f66b896bdf007ac91948140334fe36a3f010e1bac3e70a07e9f3eb9da8633189091fd5cadcabbaacd3e01da0fe7ae28a11b3dddf

      • memory/640-1121-0x0000000000AC0000-0x0000000000AC1000-memory.dmp

        Filesize

        4KB

      • memory/640-1123-0x0000000000AC0000-0x0000000000AC1000-memory.dmp

        Filesize

        4KB

      • memory/708-524-0x0000000001DF0000-0x0000000001DF1000-memory.dmp

        Filesize

        4KB

      • memory/2024-1124-0x0000000000CE0000-0x0000000000CE1000-memory.dmp

        Filesize

        4KB