Analysis
-
max time kernel
47s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
05/08/2024, 17:53
Static task
static1
Behavioral task
behavioral1
Sample
MEMZ-Clean.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
MEMZ-Clean.exe
Resource
win10v2004-20240802-en
General
-
Target
MEMZ-Clean.exe
-
Size
12KB
-
MD5
9c642c5b111ee85a6bccffc7af896a51
-
SHA1
eca8571b994fd40e2018f48c214fab6472a98bab
-
SHA256
4bbf7589615ebdb6c769d6d2e7bdcb26072bac0cda6e225a4133ba8819e688d5
-
SHA512
23cc74b5a7bdf70ba789d1730a0009414cfb9c780544e3d8d841be58782b9a9a089969c4295a0da25d07285505992386486d6ff0524e75605b96bb99cd3aaa1c
-
SSDEEP
192:BCMfc/GinpRBueYDw4+kEeN4FRrfMFFp3+f2dvGhT59uay:AMfceinpOeRENYhfOj+eGdKa
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MEMZ-Clean.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "21" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com\ = "21" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 701a9c7d60e7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\Total = "21" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000005f5a7d693dade25932cbd22534f70760ad8201806610ad00c832555513d1e838000000000e8000000002000020000000d0adcaf216fff08ddc0bbfb183d23ade6d326d7b26759480ce440b660687638520000000abda0065903981e545e3407b8cf1340f8c408062ca0e9427926b370446c33579400000004a98bcf9dc5ef29c95282f79094fa8ad10cc03c3e4b66b6c8e97e0d79c33b55a738838928e922d655026b53b44c4c2148dbae1d669ec5b71257683d63e8552de iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A81D5BB1-5353-11EF-98A3-428A07572FD0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2168 MEMZ-Clean.exe 2576 iexplore.exe 2168 MEMZ-Clean.exe -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 2168 MEMZ-Clean.exe 2168 MEMZ-Clean.exe 2168 MEMZ-Clean.exe 2168 MEMZ-Clean.exe 2168 MEMZ-Clean.exe 2168 MEMZ-Clean.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2576 iexplore.exe 2576 iexplore.exe 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE 2168 MEMZ-Clean.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2576 2168 MEMZ-Clean.exe 30 PID 2168 wrote to memory of 2576 2168 MEMZ-Clean.exe 30 PID 2168 wrote to memory of 2576 2168 MEMZ-Clean.exe 30 PID 2168 wrote to memory of 2576 2168 MEMZ-Clean.exe 30 PID 2576 wrote to memory of 2572 2576 iexplore.exe 31 PID 2576 wrote to memory of 2572 2576 iexplore.exe 31 PID 2576 wrote to memory of 2572 2576 iexplore.exe 31 PID 2576 wrote to memory of 2572 2576 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\MEMZ-Clean.exe"C:\Users\Admin\AppData\Local\Temp\MEMZ-Clean.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://google.co.ck/search?q=internet+explorer+is+the+best+browser2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2576 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2572
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db67047fa1c93554a6794b1c8a1bca81
SHA1c76a8c4d64883d77e3b53a29b03f48a6e020635d
SHA2567b5ece5289e35c94fe1c74f7e53cf658b0319058d64ebb80600051d1c956a6eb
SHA51269d45807fdbbd1f96713e4b681fcb7329bc7d0a0ae4712df85db92001ae66abeb546520f08b552a8b48d69d2b7c63f808421a0c8b7ed7c6f2610a20c0760eae9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538b803ebe23d68a9e985981aaa4dcd7e
SHA1caf11dd5eb74b98600dadc212db3ab08ff13fcd3
SHA2561994723c43e610137b93a26ff752dd336fce73cea0e84e394d8946313aec072c
SHA5127da2c52876e3c0a3e79ffa976c2cbed072878a0f159948c6d0804467c97e88aa68038529159c4db113baa7a2d27351a09c37a4228f9194fae792e5055e78c659
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593459792217cb304032617596bd18a7c
SHA17e4b408565c419b54ed7e11456ddd9ec1c092b30
SHA2568de565a828b5131f733b3537669f8048d9e7ea95ee51d6491980e069b7babb6d
SHA5125eba3577f0b6981a0668165bbf98fbc9ac6daada977c7888c69ef6db6985d82bba5f2062cc282d85b76dbdcff8130704fa5e7fe21313fcb8ebb67ea7e31dc57a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f0965b3edd99b4d3e4ae47dbc8a6754
SHA1e40cf4444a883685d406b182c6f58188be54f6f9
SHA256178ec0bef659fdcb2c794a806a234c76457abcad5cf2552c770cc67e47e84c72
SHA512dbc14a63d334a1c97558dc7455db8562a519f08602ad929f9cf03738fc01d23a8c4e62c233b7d12c2815e71d515abfe0818a758e4dbb8d32ae1370d10595ae40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a790cf72bb9ad3eeddabd1205e07d38b
SHA162e21a7778643f644dd321bee96bb935f461a0bc
SHA2567f83fb86d039ee67d2d1762e1a4b54af3d0b9bb591c466ce9553d73c2c521a0c
SHA512823fbdd0f5f00d22dde03c351b4e92d2651d177566fdcfa4cbb84d6896c4f04ff988b5710a522d79a2b487ac3292f93108c176f918ea463b0203d661252aeced
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5557d4ae0960a0254867f7ef318607102
SHA1621ef833b31005932f40fcb48a6b18b6e37a173f
SHA256d1a8bb436f69a33a6052d741f6f668c8528e861e2da1102f89bbd0a3304aa2ad
SHA5129b7ca97f0d850badd1337b98d31b1d6769f23c3f8d323b615970d1aad88324483733fc5e6f1533e8566b96fb196abb711e135f39c8ccaf2a2c78dd02543ad118
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e6da843515d2fe90796c5fbc6800086
SHA1309cfaded3e25b7829f202c8ea5453ccf09ce508
SHA256dc9bdb546ad50cc05217f992387ff71b34ea91b183497ebd9d35e4922f6e7e7b
SHA512ce8834362eaa5123b9d12e93bcc384dda90951527ac5ab4d6c754b220079704f7858a9eeed10afeb805b129d95fb923e630ec7e61dbc8e424e2491dab2dd4a8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccd2433a4e9c0d19050ba7bb1db6f901
SHA14f0e37cf3afc14834825f92c43bee5e4b02ec15d
SHA2566e27ea31b76ef6fdad64ce27f39f1f008113dd6d228bb69276fa41893c385e50
SHA5120b7b4ea24f716815ee85f639b4dd91c7ee31309c1c763ccc363f7aba5eb508e90f8a96734f1ef6c261cbe8673743879a7fb1f9cbc72eaa94b91768fe7267c372
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8530df73b0ea5d918289864cf1045a6
SHA195815546889c02a4c2f0fe82f806a3c8a75ed167
SHA2565ad0897cc38fb183726821c536542ff28de3261933230f04455e5abe19f08890
SHA512fbbaa71bb18d6e34bdf6fac950d085910e8ae5afc03c95dc0967f2b4d3041fcb06a161a62356f54d158c1d54899fd007ba02420642d6898083001cc3d25e8c78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576d47e7a5541a960939184ff95496bdf
SHA171b6ed66a0b90e8f2d533538bf86133156c4d780
SHA2563c879683e9940127620018e0a0773ac516f3d9a33a895eec1bda3f31cf8a56a9
SHA512da55de8d3007154c7873f121c122b55a6a62cca72de8a8cf4df435cd4cc3ae8f1ed0092b2b93cdf95cb827a7e5a2154dc28c65dcdfddb9ff86e1af213e441b06
-
Filesize
5KB
MD5e7b6f7acada72548340cebfe251a7626
SHA17960331db624f72f2e0cb46ae29c296db3b68cdb
SHA25616f104f037e37d8b4c0b73fdf51b926cdf44a95644410492e08b5cc05a651694
SHA512f1628ad60b95233e896bc179081e097b851b2cd4ca616f07604d3413683dad3182b503d126bb135d1c40c3a71633f29258836fb67f505988b489dd8493151b43
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8B420DKQ\favicon[1].ico
Filesize5KB
MD5f3418a443e7d841097c714d69ec4bcb8
SHA149263695f6b0cdd72f45cf1b775e660fdc36c606
SHA2566da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770
SHA51282d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LW44N8OS\recaptcha__en[1].js
Filesize531KB
MD51d96c92a257d170cba9e96057042088e
SHA170c323e5d1fc37d0839b3643c0b3825b1fc554f1
SHA256e96a5e1e04ee3d7ffd8118f853ec2c0bcbf73b571cfa1c710238557baf5dd896
SHA512a0fe722f29a7794398b315d9b6bec9e19fc478d54f53a2c14dd0d02e6071d6024d55e62bc7cf8543f2267fb96c352917ef4a2fdc5286f7997c8a5dc97519ee99
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b