Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
28/06/2024, 02:19
240628-cr3n9swcqg 821/06/2024, 17:11
240621-vqpecsscqk 820/06/2024, 14:32
240620-rwkftasdmc 813/06/2024, 21:29
240613-1cbh8svbkm 813/06/2024, 21:24
240613-z9bptszhke 813/06/2024, 21:01
240613-ztvsrszdre 8Analysis
-
max time kernel
30s -
max time network
33s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
13/06/2024, 21:29
Static task
static1
Behavioral task
behavioral1
Sample
VineMEMZ-Original.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
VineMEMZ-Original.exe
Resource
win10v2004-20240611-en
General
-
Target
VineMEMZ-Original.exe
-
Size
39.6MB
-
MD5
b949ba30eb82cc79eeb7c2d64f483bcb
-
SHA1
8361089264726bb6cff752b3c137fde6d01f4d80
-
SHA256
5f6a8f0e85704eb30340a872eec136623e57ab014b4dd165c68dd8cd76143923
-
SHA512
e2acd4fe7627e55be3e019540269033f65d4954831a732d7a4bd50607260cd2a238832f604fa344f04be9f70e8757a9f2d797de37b440159a16bf3a6359a759b
-
SSDEEP
786432:1fhwEXgLYTou24XbHzjkgV5bQAH/AbkP1hn0qPQPrhBPC7wYqljbdPIa:dqgb84DPn5vhbIPdZaWljbdPIa
Malware Config
Signatures
-
Sets file execution options in registry 2 TTPs 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\Debugger = "rekt.exe" MEMZ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "rekt.exe" MEMZ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\logonui.exe MEMZ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "rekt.exe" MEMZ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe MEMZ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe MEMZ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe MEMZ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe MEMZ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe\Debugger = "rekt.exe" MEMZ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\shutdown.exe\Debugger = "rekt.exe" MEMZ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "rekt.exe" MEMZ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\shutdown.exe MEMZ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe MEMZ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\logonui.exe\Debugger = "rekt.exe" MEMZ.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Control Panel\International\Geo\Nation MEMZ.exe Key value queried \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Control Panel\International\Geo\Nation VineMEMZ-Original.exe -
Executes dropped EXE 5 IoCs
pid Process 1644 MEMZ.exe 2740 MEMZ.exe 3628 MEMZ.exe 3852 MEMZ.exe 2908 MEMZ.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 MEMZ.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Roaming\\Data\\Pussy.png" MEMZ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2740 MEMZ.exe 3852 MEMZ.exe 3852 MEMZ.exe 2740 MEMZ.exe 3628 MEMZ.exe 3628 MEMZ.exe 3852 MEMZ.exe 2740 MEMZ.exe 3852 MEMZ.exe 2740 MEMZ.exe 3628 MEMZ.exe 3628 MEMZ.exe 2740 MEMZ.exe 3852 MEMZ.exe 2740 MEMZ.exe 3852 MEMZ.exe 3628 MEMZ.exe 3628 MEMZ.exe 3852 MEMZ.exe 2740 MEMZ.exe 3852 MEMZ.exe 2740 MEMZ.exe 3628 MEMZ.exe 3628 MEMZ.exe 2740 MEMZ.exe 3852 MEMZ.exe 2740 MEMZ.exe 3852 MEMZ.exe 3628 MEMZ.exe 3628 MEMZ.exe 3852 MEMZ.exe 2740 MEMZ.exe 3852 MEMZ.exe 2740 MEMZ.exe 3628 MEMZ.exe 3628 MEMZ.exe 3852 MEMZ.exe 2740 MEMZ.exe 2740 MEMZ.exe 3852 MEMZ.exe 3628 MEMZ.exe 3628 MEMZ.exe 3852 MEMZ.exe 2740 MEMZ.exe 3852 MEMZ.exe 2740 MEMZ.exe 3628 MEMZ.exe 3628 MEMZ.exe 2740 MEMZ.exe 3852 MEMZ.exe 3852 MEMZ.exe 2740 MEMZ.exe 3628 MEMZ.exe 3628 MEMZ.exe 2740 MEMZ.exe 3852 MEMZ.exe 2740 MEMZ.exe 3852 MEMZ.exe 3628 MEMZ.exe 3628 MEMZ.exe 3852 MEMZ.exe 2740 MEMZ.exe 3852 MEMZ.exe 2740 MEMZ.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1584 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1584 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2908 MEMZ.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2908 MEMZ.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4028 wrote to memory of 1644 4028 VineMEMZ-Original.exe 89 PID 4028 wrote to memory of 1644 4028 VineMEMZ-Original.exe 89 PID 4028 wrote to memory of 1644 4028 VineMEMZ-Original.exe 89 PID 1644 wrote to memory of 3628 1644 MEMZ.exe 90 PID 1644 wrote to memory of 3628 1644 MEMZ.exe 90 PID 1644 wrote to memory of 3628 1644 MEMZ.exe 90 PID 1644 wrote to memory of 2740 1644 MEMZ.exe 91 PID 1644 wrote to memory of 2740 1644 MEMZ.exe 91 PID 1644 wrote to memory of 2740 1644 MEMZ.exe 91 PID 1644 wrote to memory of 3852 1644 MEMZ.exe 92 PID 1644 wrote to memory of 3852 1644 MEMZ.exe 92 PID 1644 wrote to memory of 3852 1644 MEMZ.exe 92 PID 1644 wrote to memory of 2908 1644 MEMZ.exe 93 PID 1644 wrote to memory of 2908 1644 MEMZ.exe 93 PID 1644 wrote to memory of 2908 1644 MEMZ.exe 93 PID 2908 wrote to memory of 1576 2908 MEMZ.exe 94 PID 2908 wrote to memory of 1576 2908 MEMZ.exe 94 PID 2908 wrote to memory of 1576 2908 MEMZ.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\VineMEMZ-Original.exe"C:\Users\Admin\AppData\Local\Temp\VineMEMZ-Original.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Users\Admin\AppData\Roaming\MEMZ.exe"C:\Users\Admin\AppData\Roaming\MEMZ.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Users\Admin\AppData\Roaming\MEMZ.exe/watchdog3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3628
-
-
C:\Users\Admin\AppData\Roaming\MEMZ.exe/watchdog3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2740
-
-
C:\Users\Admin\AppData\Roaming\MEMZ.exe/watchdog3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3852
-
-
C:\Users\Admin\AppData\Roaming\MEMZ.exe/main3⤵
- Sets file execution options in registry
- Checks computer location settings
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Sets desktop wallpaper using registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\System32\notepad.exe" \note.txt4⤵PID:1576
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3524,i,17949988676391029604,13756926835471203788,262144 --variations-seed-version --mojo-platform-channel-handle=4212 /prefetch:81⤵PID:3660
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x514 0x50c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1584
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
353KB
MD58766dce04feb646bf62206d64d6eb0ba
SHA191c5d588028c6c949e9cbcec950bcfaa35a791e4
SHA256f87e1ab69bef059744ee9244f37b0f21ef7d7b06fc5245094cfa22637ef6ae9d
SHA5120bc8fc880bb94ad55a732f2be207d88a6bb0ae8d97f91819e889d04420a71ae5d91af21861bad351c5fd7f4e944c1899b17df326bf19d310cc31a95fd38ee6a3
-
Filesize
408KB
MD55ada580c290b53327fc8db29d5cd66c5
SHA1a504aff6a9fa93bf4ccb69df17b5238804c659f9
SHA2565dcf1f4b285a6dd70ec7acd77eeb5752a3d381a8a697eafd394fcde615f3ba63
SHA51236da1958e7b4fad5367b257d9343c4eab59d50b01c610514d48eae2d0eeabf7efd06dd8fc63551a0a7e11df91aa3ceb063003cdd9c30c6755431ba218524fd49
-
Filesize
21KB
MD55761ae6b5665092c45fc8e9292627f88
SHA1a7f18d7cf5438ee7dcb4e644163f495d3fa9c0ef
SHA2567acabca3631db2a73a5e20abd050097e44390ead1d74717aed936601904b73c2
SHA5121d743b407663e00a296c2ae45cb5a05a0866657afafbc9e8220e4c1839cbab2c09bf2a3510ec8016f902ccb7254edddf2a3412e7f5a4cafcabbeb5724a67b46e
-
Filesize
133B
MD5910efec550edf98bf4f4e7ab50ca8f98
SHA14571d44dc60e892fb22ccd0bc2c79c3553560742
SHA2567349f657a8d247fc778b7dd68e88bc8aba73bf2c399dc17deb2c9114c038430b
SHA512320de5e34c129dd4a742ff352cfe0be2fac5874b593631529e53d5fe513709ac01f5d1d3dfae659f36a2a33aae51534ec838f5d3748cd6d1230a0f3d29341442