Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
28/06/2024, 02:19
240628-cr3n9swcqg 821/06/2024, 17:11
240621-vqpecsscqk 820/06/2024, 14:32
240620-rwkftasdmc 813/06/2024, 21:29
240613-1cbh8svbkm 813/06/2024, 21:24
240613-z9bptszhke 813/06/2024, 21:01
240613-ztvsrszdre 8Analysis
-
max time kernel
30s -
platform
windows11-21h2_x64 -
resource
win11-20240611-en -
resource tags
arch:x64arch:x86image:win11-20240611-enlocale:en-usos:windows11-21h2-x64system -
submitted
21/06/2024, 17:11
Static task
static1
Behavioral task
behavioral1
Sample
VineMEMZ-Original.exe
Resource
win11-20240611-en
General
-
Target
VineMEMZ-Original.exe
-
Size
39.6MB
-
MD5
b949ba30eb82cc79eeb7c2d64f483bcb
-
SHA1
8361089264726bb6cff752b3c137fde6d01f4d80
-
SHA256
5f6a8f0e85704eb30340a872eec136623e57ab014b4dd165c68dd8cd76143923
-
SHA512
e2acd4fe7627e55be3e019540269033f65d4954831a732d7a4bd50607260cd2a238832f604fa344f04be9f70e8757a9f2d797de37b440159a16bf3a6359a759b
-
SSDEEP
786432:1fhwEXgLYTou24XbHzjkgV5bQAH/AbkP1hn0qPQPrhBPC7wYqljbdPIa:dqgb84DPn5vhbIPdZaWljbdPIa
Malware Config
Signatures
-
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "rekt.exe" MEMZ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\logonui.exe MEMZ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "rekt.exe" MEMZ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\Debugger = "rekt.exe" MEMZ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\shutdown.exe MEMZ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\shutdown.exe\Debugger = "rekt.exe" MEMZ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe MEMZ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe MEMZ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe\Debugger = "rekt.exe" MEMZ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe MEMZ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe MEMZ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe MEMZ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\logonui.exe\Debugger = "rekt.exe" MEMZ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "rekt.exe" MEMZ.exe -
Executes dropped EXE 5 IoCs
pid Process 2316 MEMZ.exe 3408 MEMZ.exe 580 MEMZ.exe 2424 MEMZ.exe 4104 MEMZ.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 MEMZ.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2394516847-3409208829-2230326962-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Roaming\\Data\\Pussy.png" MEMZ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3408 MEMZ.exe 4104 MEMZ.exe 4104 MEMZ.exe 3408 MEMZ.exe 580 MEMZ.exe 580 MEMZ.exe 580 MEMZ.exe 4104 MEMZ.exe 580 MEMZ.exe 4104 MEMZ.exe 3408 MEMZ.exe 3408 MEMZ.exe 3408 MEMZ.exe 4104 MEMZ.exe 3408 MEMZ.exe 4104 MEMZ.exe 580 MEMZ.exe 580 MEMZ.exe 580 MEMZ.exe 3408 MEMZ.exe 580 MEMZ.exe 3408 MEMZ.exe 4104 MEMZ.exe 4104 MEMZ.exe 4104 MEMZ.exe 580 MEMZ.exe 4104 MEMZ.exe 580 MEMZ.exe 3408 MEMZ.exe 3408 MEMZ.exe 3408 MEMZ.exe 580 MEMZ.exe 3408 MEMZ.exe 580 MEMZ.exe 4104 MEMZ.exe 4104 MEMZ.exe 4104 MEMZ.exe 580 MEMZ.exe 580 MEMZ.exe 4104 MEMZ.exe 3408 MEMZ.exe 3408 MEMZ.exe 3408 MEMZ.exe 4104 MEMZ.exe 3408 MEMZ.exe 4104 MEMZ.exe 580 MEMZ.exe 580 MEMZ.exe 580 MEMZ.exe 4104 MEMZ.exe 580 MEMZ.exe 4104 MEMZ.exe 3408 MEMZ.exe 3408 MEMZ.exe 3408 MEMZ.exe 4104 MEMZ.exe 3408 MEMZ.exe 4104 MEMZ.exe 580 MEMZ.exe 580 MEMZ.exe 580 MEMZ.exe 4104 MEMZ.exe 580 MEMZ.exe 4104 MEMZ.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3120 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3120 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2424 MEMZ.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2424 MEMZ.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 5072 wrote to memory of 2316 5072 VineMEMZ-Original.exe 80 PID 5072 wrote to memory of 2316 5072 VineMEMZ-Original.exe 80 PID 5072 wrote to memory of 2316 5072 VineMEMZ-Original.exe 80 PID 2316 wrote to memory of 3408 2316 MEMZ.exe 81 PID 2316 wrote to memory of 3408 2316 MEMZ.exe 81 PID 2316 wrote to memory of 3408 2316 MEMZ.exe 81 PID 2316 wrote to memory of 4104 2316 MEMZ.exe 82 PID 2316 wrote to memory of 4104 2316 MEMZ.exe 82 PID 2316 wrote to memory of 4104 2316 MEMZ.exe 82 PID 2316 wrote to memory of 580 2316 MEMZ.exe 83 PID 2316 wrote to memory of 580 2316 MEMZ.exe 83 PID 2316 wrote to memory of 580 2316 MEMZ.exe 83 PID 2316 wrote to memory of 2424 2316 MEMZ.exe 84 PID 2316 wrote to memory of 2424 2316 MEMZ.exe 84 PID 2316 wrote to memory of 2424 2316 MEMZ.exe 84 PID 2424 wrote to memory of 2360 2424 MEMZ.exe 85 PID 2424 wrote to memory of 2360 2424 MEMZ.exe 85 PID 2424 wrote to memory of 2360 2424 MEMZ.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\VineMEMZ-Original.exe"C:\Users\Admin\AppData\Local\Temp\VineMEMZ-Original.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Users\Admin\AppData\Roaming\MEMZ.exe"C:\Users\Admin\AppData\Roaming\MEMZ.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Roaming\MEMZ.exe/watchdog3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3408
-
-
C:\Users\Admin\AppData\Roaming\MEMZ.exe/watchdog3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4104
-
-
C:\Users\Admin\AppData\Roaming\MEMZ.exe/watchdog3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:580
-
-
C:\Users\Admin\AppData\Roaming\MEMZ.exe/main3⤵
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Sets desktop wallpaper using registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\System32\notepad.exe" \note.txt4⤵PID:2360
-
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004E4 0x00000000000004EC1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3120
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
353KB
MD58766dce04feb646bf62206d64d6eb0ba
SHA191c5d588028c6c949e9cbcec950bcfaa35a791e4
SHA256f87e1ab69bef059744ee9244f37b0f21ef7d7b06fc5245094cfa22637ef6ae9d
SHA5120bc8fc880bb94ad55a732f2be207d88a6bb0ae8d97f91819e889d04420a71ae5d91af21861bad351c5fd7f4e944c1899b17df326bf19d310cc31a95fd38ee6a3
-
Filesize
408KB
MD55ada580c290b53327fc8db29d5cd66c5
SHA1a504aff6a9fa93bf4ccb69df17b5238804c659f9
SHA2565dcf1f4b285a6dd70ec7acd77eeb5752a3d381a8a697eafd394fcde615f3ba63
SHA51236da1958e7b4fad5367b257d9343c4eab59d50b01c610514d48eae2d0eeabf7efd06dd8fc63551a0a7e11df91aa3ceb063003cdd9c30c6755431ba218524fd49
-
Filesize
21KB
MD55761ae6b5665092c45fc8e9292627f88
SHA1a7f18d7cf5438ee7dcb4e644163f495d3fa9c0ef
SHA2567acabca3631db2a73a5e20abd050097e44390ead1d74717aed936601904b73c2
SHA5121d743b407663e00a296c2ae45cb5a05a0866657afafbc9e8220e4c1839cbab2c09bf2a3510ec8016f902ccb7254edddf2a3412e7f5a4cafcabbeb5724a67b46e
-
Filesize
133B
MD5910efec550edf98bf4f4e7ab50ca8f98
SHA14571d44dc60e892fb22ccd0bc2c79c3553560742
SHA2567349f657a8d247fc778b7dd68e88bc8aba73bf2c399dc17deb2c9114c038430b
SHA512320de5e34c129dd4a742ff352cfe0be2fac5874b593631529e53d5fe513709ac01f5d1d3dfae659f36a2a33aae51534ec838f5d3748cd6d1230a0f3d29341442