Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
03/08/2024, 05:17
240803-fyp9asygqc 703/08/2024, 05:15
240803-fxj1wsygmh 603/08/2024, 05:12
240803-fv63msygka 6Analysis
-
max time kernel
21s -
max time network
17s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
03/08/2024, 05:15
Static task
static1
Behavioral task
behavioral1
Sample
MEMZ.exe
Resource
win10-20240404-en
General
-
Target
MEMZ.exe
-
Size
16KB
-
MD5
1d5ad9c8d3fee874d0feb8bfac220a11
-
SHA1
ca6d3f7e6c784155f664a9179ca64e4034df9595
-
SHA256
3872c12d31fc9825e8661ac01ecee2572460677afbc7093f920a8436a42e28ff
-
SHA512
c8246f4137416be33b6d1ac89f2428b7c44d9376ac8489a9fbf65ef128a6c53fb50479e1e400c8e201c8611992ab1d6c1bd3d6cece89013edb4d35cdd22305b1
-
SSDEEP
192:M2WgyvSW8gRc6olcIEiwqZKBkDFR43xWTM3LHf26gFrcx3sNq:JWgnSmFlcIqq3agmLH+6gF23sN
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 MEMZ.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\rescache\_merged\4183903823\2290032291.pri taskmgr.exe File created C:\Windows\rescache\_merged\1601268389\715946058.pri taskmgr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MEMZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MEMZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1432 MEMZ.exe 1432 MEMZ.exe 1432 MEMZ.exe 192 MEMZ.exe 192 MEMZ.exe 1432 MEMZ.exe 1432 MEMZ.exe 192 MEMZ.exe 1432 MEMZ.exe 192 MEMZ.exe 684 MEMZ.exe 2472 MEMZ.exe 684 MEMZ.exe 2472 MEMZ.exe 684 MEMZ.exe 2472 MEMZ.exe 684 MEMZ.exe 2472 MEMZ.exe 192 MEMZ.exe 1432 MEMZ.exe 192 MEMZ.exe 1432 MEMZ.exe 4220 MEMZ.exe 4220 MEMZ.exe 1432 MEMZ.exe 4220 MEMZ.exe 1432 MEMZ.exe 4220 MEMZ.exe 192 MEMZ.exe 2472 MEMZ.exe 192 MEMZ.exe 2472 MEMZ.exe 684 MEMZ.exe 684 MEMZ.exe 2472 MEMZ.exe 684 MEMZ.exe 2472 MEMZ.exe 684 MEMZ.exe 192 MEMZ.exe 4220 MEMZ.exe 192 MEMZ.exe 4220 MEMZ.exe 1432 MEMZ.exe 1432 MEMZ.exe 1432 MEMZ.exe 4220 MEMZ.exe 1432 MEMZ.exe 4220 MEMZ.exe 192 MEMZ.exe 192 MEMZ.exe 684 MEMZ.exe 684 MEMZ.exe 2472 MEMZ.exe 2472 MEMZ.exe 2472 MEMZ.exe 684 MEMZ.exe 2472 MEMZ.exe 684 MEMZ.exe 192 MEMZ.exe 192 MEMZ.exe 4220 MEMZ.exe 4220 MEMZ.exe 1432 MEMZ.exe 1432 MEMZ.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1392 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1392 taskmgr.exe Token: SeSystemProfilePrivilege 1392 taskmgr.exe Token: SeCreateGlobalPrivilege 1392 taskmgr.exe Token: SeShutdownPrivilege 684 MEMZ.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 1392 taskmgr.exe 1392 taskmgr.exe 1392 taskmgr.exe 1392 taskmgr.exe 1392 taskmgr.exe 1392 taskmgr.exe 1392 taskmgr.exe 1392 taskmgr.exe 1392 taskmgr.exe 1392 taskmgr.exe 1392 taskmgr.exe 1392 taskmgr.exe 1392 taskmgr.exe 1392 taskmgr.exe 1392 taskmgr.exe 1392 taskmgr.exe 1392 taskmgr.exe 1392 taskmgr.exe 1392 taskmgr.exe 1392 taskmgr.exe 1392 taskmgr.exe 1392 taskmgr.exe 1392 taskmgr.exe 1392 taskmgr.exe 1392 taskmgr.exe 1392 taskmgr.exe 1392 taskmgr.exe 1392 taskmgr.exe 1392 taskmgr.exe -
Suspicious use of SendNotifyMessage 29 IoCs
pid Process 1392 taskmgr.exe 1392 taskmgr.exe 1392 taskmgr.exe 1392 taskmgr.exe 1392 taskmgr.exe 1392 taskmgr.exe 1392 taskmgr.exe 1392 taskmgr.exe 1392 taskmgr.exe 1392 taskmgr.exe 1392 taskmgr.exe 1392 taskmgr.exe 1392 taskmgr.exe 1392 taskmgr.exe 1392 taskmgr.exe 1392 taskmgr.exe 1392 taskmgr.exe 1392 taskmgr.exe 1392 taskmgr.exe 1392 taskmgr.exe 1392 taskmgr.exe 1392 taskmgr.exe 1392 taskmgr.exe 1392 taskmgr.exe 1392 taskmgr.exe 1392 taskmgr.exe 1392 taskmgr.exe 1392 taskmgr.exe 1392 taskmgr.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 684 MEMZ.exe 1432 MEMZ.exe 2472 MEMZ.exe 192 MEMZ.exe 684 MEMZ.exe 2472 MEMZ.exe 192 MEMZ.exe 1432 MEMZ.exe 684 MEMZ.exe 1432 MEMZ.exe 192 MEMZ.exe 2472 MEMZ.exe 684 MEMZ.exe 192 MEMZ.exe 2472 MEMZ.exe 1432 MEMZ.exe 684 MEMZ.exe 1432 MEMZ.exe 2472 MEMZ.exe 192 MEMZ.exe 684 MEMZ.exe 2472 MEMZ.exe 1432 MEMZ.exe 192 MEMZ.exe 684 MEMZ.exe 192 MEMZ.exe 1432 MEMZ.exe 2472 MEMZ.exe 684 MEMZ.exe 192 MEMZ.exe 1432 MEMZ.exe 2472 MEMZ.exe 684 MEMZ.exe 1432 MEMZ.exe 192 MEMZ.exe 2472 MEMZ.exe 684 MEMZ.exe 2472 MEMZ.exe 1432 MEMZ.exe 192 MEMZ.exe 684 MEMZ.exe 192 MEMZ.exe 1432 MEMZ.exe 2472 MEMZ.exe 684 MEMZ.exe 2472 MEMZ.exe 1432 MEMZ.exe 192 MEMZ.exe 684 MEMZ.exe 192 MEMZ.exe 1432 MEMZ.exe 2472 MEMZ.exe 684 MEMZ.exe 1432 MEMZ.exe 2472 MEMZ.exe 192 MEMZ.exe 684 MEMZ.exe 2472 MEMZ.exe 1432 MEMZ.exe 192 MEMZ.exe 684 MEMZ.exe 1432 MEMZ.exe 2472 MEMZ.exe 192 MEMZ.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4140 wrote to memory of 1432 4140 MEMZ.exe 73 PID 4140 wrote to memory of 1432 4140 MEMZ.exe 73 PID 4140 wrote to memory of 1432 4140 MEMZ.exe 73 PID 4140 wrote to memory of 192 4140 MEMZ.exe 74 PID 4140 wrote to memory of 192 4140 MEMZ.exe 74 PID 4140 wrote to memory of 192 4140 MEMZ.exe 74 PID 4140 wrote to memory of 2472 4140 MEMZ.exe 75 PID 4140 wrote to memory of 2472 4140 MEMZ.exe 75 PID 4140 wrote to memory of 2472 4140 MEMZ.exe 75 PID 4140 wrote to memory of 684 4140 MEMZ.exe 76 PID 4140 wrote to memory of 684 4140 MEMZ.exe 76 PID 4140 wrote to memory of 684 4140 MEMZ.exe 76 PID 4140 wrote to memory of 4220 4140 MEMZ.exe 77 PID 4140 wrote to memory of 4220 4140 MEMZ.exe 77 PID 4140 wrote to memory of 4220 4140 MEMZ.exe 77 PID 4140 wrote to memory of 2176 4140 MEMZ.exe 78 PID 4140 wrote to memory of 2176 4140 MEMZ.exe 78 PID 4140 wrote to memory of 2176 4140 MEMZ.exe 78 PID 2176 wrote to memory of 3664 2176 MEMZ.exe 80 PID 2176 wrote to memory of 3664 2176 MEMZ.exe 80 PID 2176 wrote to memory of 3664 2176 MEMZ.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\MEMZ.exe"C:\Users\Admin\AppData\Local\Temp\MEMZ.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Users\Admin\AppData\Local\Temp\MEMZ.exe"C:\Users\Admin\AppData\Local\Temp\MEMZ.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1432
-
-
C:\Users\Admin\AppData\Local\Temp\MEMZ.exe"C:\Users\Admin\AppData\Local\Temp\MEMZ.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:192
-
-
C:\Users\Admin\AppData\Local\Temp\MEMZ.exe"C:\Users\Admin\AppData\Local\Temp\MEMZ.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2472
-
-
C:\Users\Admin\AppData\Local\Temp\MEMZ.exe"C:\Users\Admin\AppData\Local\Temp\MEMZ.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:684
-
-
C:\Users\Admin\AppData\Local\Temp\MEMZ.exe"C:\Users\Admin\AppData\Local\Temp\MEMZ.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4220
-
-
C:\Users\Admin\AppData\Local\Temp\MEMZ.exe"C:\Users\Admin\AppData\Local\Temp\MEMZ.exe" /main2⤵
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\System32\notepad.exe" \note.txt3⤵
- System Location Discovery: System Language Discovery
PID:3664
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
218B
MD5afa6955439b8d516721231029fb9ca1b
SHA1087a043cc123c0c0df2ffadcf8e71e3ac86bbae9
SHA2568e9f20f6864c66576536c0b866c6ffdcf11397db67fe120e972e244c3c022270
SHA5125da21a31fbc4e8250dffed30f66b896bdf007ac91948140334fe36a3f010e1bac3e70a07e9f3eb9da8633189091fd5cadcabbaacd3e01da0fe7ae28a11b3dddf