Analysis
-
max time kernel
67s -
max time network
67s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
28/04/2024, 16:20
Static task
static1
Behavioral task
behavioral1
Sample
KaneMEMZ.exe
Resource
win11-20240419-en
General
-
Target
KaneMEMZ.exe
-
Size
1.1MB
-
MD5
f7198a6161828d31781f77bbaa759bb7
-
SHA1
e9d3132fff5df2163c48c617421d6bf5b6e90f18
-
SHA256
d3ef86049ff983b3e0cb59b537aadf962de420570a23b5ee61d2fa3145fcf667
-
SHA512
74ef6cf7e19135f4c0eb90e4f284a5eca65de4c2fc18510ad9c61f9463653e3c80b40c15031208cf44f6762757d9cd7be7cc62eb5c1effccfd655f497a36fbba
-
SSDEEP
24576:YizhS0x6VkEx8ojX1NQX3eCH4xtp4jRtSCwZLn3VZzqnON20H:dJETQX1Yxti4T/
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2976 MBR.exe 4720 T.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 MBR.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\MEMZ.jpg" KaneMEMZ.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\rescache\_merged\425634766\551545383.pri LogonUI.exe -
Modifies Control Panel 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000\Control Panel\Desktop\WallpaperStyle = "2" KaneMEMZ.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000\Control Panel\Desktop\TileWallpaper = "2" KaneMEMZ.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = 99ebff004cc2ff000091f8000078d4000067c000003e9200001a6800f7630c00 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292114432" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4290799360" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292114432" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365268" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365268" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "98" LogonUI.exe -
Suspicious behavior: LoadsDriver 64 IoCs
pid Process 972 Process not Found 240 Process not Found 4312 Process not Found 4128 Process not Found 4936 Process not Found 2908 Process not Found 2208 Process not Found 2736 Process not Found 1372 Process not Found 1032 Process not Found 420 Process not Found 3164 Process not Found 2848 Process not Found 3156 Process not Found 236 Process not Found 4708 Process not Found 3592 Process not Found 1896 Process not Found 4136 Process not Found 2344 Process not Found 1904 Process not Found 800 Process not Found 3052 Process not Found 3464 Process not Found 3168 Process not Found 3120 Process not Found 2684 Process not Found 492 Process not Found 2680 Process not Found 4520 Process not Found 4060 Process not Found 3928 Process not Found 2612 Process not Found 4044 Process not Found 1252 Process not Found 3752 Process not Found 4324 Process not Found 1540 Process not Found 3332 Process not Found 3264 Process not Found 1512 Process not Found 4948 Process not Found 4496 Process not Found 2088 Process not Found 1908 Process not Found 1308 Process not Found 1872 Process not Found 1828 Process not Found 2412 Process not Found 5068 Process not Found 412 Process not Found 1496 Process not Found 4856 Process not Found 3616 Process not Found 4488 Process not Found 1664 Process not Found 3540 Process not Found 4020 Process not Found 4612 Process not Found 1100 Process not Found 3424 Process not Found 2036 Process not Found 3884 Process not Found 2104 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4744 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4744 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 5060 KaneMEMZ.exe 5060 KaneMEMZ.exe 756 LogonUI.exe 756 LogonUI.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5060 wrote to memory of 2976 5060 KaneMEMZ.exe 80 PID 5060 wrote to memory of 2976 5060 KaneMEMZ.exe 80 PID 5060 wrote to memory of 2976 5060 KaneMEMZ.exe 80 PID 5060 wrote to memory of 2100 5060 KaneMEMZ.exe 81 PID 5060 wrote to memory of 2100 5060 KaneMEMZ.exe 81 PID 5060 wrote to memory of 2100 5060 KaneMEMZ.exe 81 PID 5060 wrote to memory of 4720 5060 KaneMEMZ.exe 82 PID 5060 wrote to memory of 4720 5060 KaneMEMZ.exe 82 PID 5060 wrote to memory of 4720 5060 KaneMEMZ.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\KaneMEMZ.exe"C:\Users\Admin\AppData\Local\Temp\KaneMEMZ.exe"1⤵
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\MBR.exeC:\Users\Admin\AppData\Local\Temp\\MBR.exe2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:2976
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe C:\Users\Admin\AppData\Local\Temp\\note.txt2⤵PID:2100
-
-
C:\Users\Admin\AppData\Local\Temp\T.exeC:\Users\Admin\AppData\Local\Temp\\T.exe2⤵
- Executes dropped EXE
PID:4720
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004C4 0x00000000000004CC1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4744
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3a1a055 /state1:0x41c64e6d1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:756
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD562e84719950c1e880337a2227170777b
SHA1fbe18bb919391e75453cedc34bfd13f35a7874c9
SHA2565b6c61fb89e825dddcf86fbe9c0c507409c141a92d9725b3cd0258207436597e
SHA51222d2996f8a02c18303e49b41a6f44e0ea861f70a1cb0afff13b44ebce7038f420693060a860e4e863cf025f789ca05f5eb20c1269e77f3ba9bd16597c125acb5
-
Filesize
83KB
MD5a9ad6ca7d99a8ad21d7f197b5e82be06
SHA18ef7889957a8d086ad03994bda4a3cf04eb1afe5
SHA256a1c3c84cc5943818fc3b321ba28bca076ee8aba91c33dac51695d9eb685e437c
SHA51235e48422f9626006fcb9e6bf7ea44f3d9a615b4004ab407d46c02aae8475910722fadd9348a9b8f2181a2739c271a2b2f539d97fe799a4818b4fb81a1271d719
-
Filesize
266B
MD5a8bab44204bfb44e32bbd92c354fee4e
SHA13f82017f8e72d77061e5b265d44a510fa9113a5a
SHA256909a4793c5681687646f04d024c4741605dc11ab2f54956457417031965b05a6
SHA5127014bfc27d21fd8f87ae453a3c974503d390e317efa526c121124fb1da7601dff399459d5a9d37a471c52a9e978d5191a06ed5a28645674013b6d058baa56db1
-
Filesize
875B
MD5b76b5675d91e9a9945e4b4b5bfb45942
SHA11e5cc4a895254de3b87dca4455a1ea5221bbfdcd
SHA25643cbbfe3d93ad0aefd77ce3bd68fcde826f1dcf8eea5b551b24aefaf937bd43c
SHA512cfacc0a8c8e791309ccaf1fd98fa84ab9dd084025d3c6140fa0402e28fea8eb221eff717218e268d4e549aed8e3e8dce545cf5b4ca1d19fdf1723ca11820b4de