Analysis
-
max time kernel
148s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 06:21
Static task
static1
Behavioral task
behavioral1
Sample
KaneMEMZ.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
KaneMEMZ.exe
Resource
win10v2004-20240802-en
General
-
Target
KaneMEMZ.exe
-
Size
1.1MB
-
MD5
f7198a6161828d31781f77bbaa759bb7
-
SHA1
e9d3132fff5df2163c48c617421d6bf5b6e90f18
-
SHA256
d3ef86049ff983b3e0cb59b537aadf962de420570a23b5ee61d2fa3145fcf667
-
SHA512
74ef6cf7e19135f4c0eb90e4f284a5eca65de4c2fc18510ad9c61f9463653e3c80b40c15031208cf44f6762757d9cd7be7cc62eb5c1effccfd655f497a36fbba
-
SSDEEP
24576:YizhS0x6VkEx8ojX1NQX3eCH4xtp4jRtSCwZLn3VZzqnON20H:dJETQX1Yxti4T/
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 468 MBR.exe 2684 T.exe -
Loads dropped DLL 3 IoCs
pid Process 1872 KaneMEMZ.exe 1872 KaneMEMZ.exe 1872 KaneMEMZ.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 MBR.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\MEMZ.jpg" KaneMEMZ.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KaneMEMZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language T.exe -
Modifies Control Panel 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Control Panel\Desktop\WallpaperStyle = "2" KaneMEMZ.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Control Panel\Desktop\TileWallpaper = "2" KaneMEMZ.exe -
Suspicious use of SetWindowsHookEx 18 IoCs
pid Process 1872 KaneMEMZ.exe 1872 KaneMEMZ.exe 2684 T.exe 2684 T.exe 2684 T.exe 2684 T.exe 2684 T.exe 2684 T.exe 2684 T.exe 2684 T.exe 2684 T.exe 2684 T.exe 2684 T.exe 2684 T.exe 2684 T.exe 2684 T.exe 2684 T.exe 2684 T.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1872 wrote to memory of 468 1872 KaneMEMZ.exe 31 PID 1872 wrote to memory of 468 1872 KaneMEMZ.exe 31 PID 1872 wrote to memory of 468 1872 KaneMEMZ.exe 31 PID 1872 wrote to memory of 468 1872 KaneMEMZ.exe 31 PID 1872 wrote to memory of 1684 1872 KaneMEMZ.exe 32 PID 1872 wrote to memory of 1684 1872 KaneMEMZ.exe 32 PID 1872 wrote to memory of 1684 1872 KaneMEMZ.exe 32 PID 1872 wrote to memory of 1684 1872 KaneMEMZ.exe 32 PID 1872 wrote to memory of 2684 1872 KaneMEMZ.exe 33 PID 1872 wrote to memory of 2684 1872 KaneMEMZ.exe 33 PID 1872 wrote to memory of 2684 1872 KaneMEMZ.exe 33 PID 1872 wrote to memory of 2684 1872 KaneMEMZ.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\KaneMEMZ.exe"C:\Users\Admin\AppData\Local\Temp\KaneMEMZ.exe"1⤵
- Loads dropped DLL
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\MBR.exeC:\Users\Admin\AppData\Local\Temp\\MBR.exe2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:468
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe C:\Users\Admin\AppData\Local\Temp\\note.txt2⤵
- System Location Discovery: System Language Discovery
PID:1684
-
-
C:\Users\Admin\AppData\Local\Temp\T.exeC:\Users\Admin\AppData\Local\Temp\\T.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
266B
MD5a8bab44204bfb44e32bbd92c354fee4e
SHA13f82017f8e72d77061e5b265d44a510fa9113a5a
SHA256909a4793c5681687646f04d024c4741605dc11ab2f54956457417031965b05a6
SHA5127014bfc27d21fd8f87ae453a3c974503d390e317efa526c121124fb1da7601dff399459d5a9d37a471c52a9e978d5191a06ed5a28645674013b6d058baa56db1
-
Filesize
875B
MD5b76b5675d91e9a9945e4b4b5bfb45942
SHA11e5cc4a895254de3b87dca4455a1ea5221bbfdcd
SHA25643cbbfe3d93ad0aefd77ce3bd68fcde826f1dcf8eea5b551b24aefaf937bd43c
SHA512cfacc0a8c8e791309ccaf1fd98fa84ab9dd084025d3c6140fa0402e28fea8eb221eff717218e268d4e549aed8e3e8dce545cf5b4ca1d19fdf1723ca11820b4de
-
Filesize
11KB
MD562e84719950c1e880337a2227170777b
SHA1fbe18bb919391e75453cedc34bfd13f35a7874c9
SHA2565b6c61fb89e825dddcf86fbe9c0c507409c141a92d9725b3cd0258207436597e
SHA51222d2996f8a02c18303e49b41a6f44e0ea861f70a1cb0afff13b44ebce7038f420693060a860e4e863cf025f789ca05f5eb20c1269e77f3ba9bd16597c125acb5
-
Filesize
83KB
MD5a9ad6ca7d99a8ad21d7f197b5e82be06
SHA18ef7889957a8d086ad03994bda4a3cf04eb1afe5
SHA256a1c3c84cc5943818fc3b321ba28bca076ee8aba91c33dac51695d9eb685e437c
SHA51235e48422f9626006fcb9e6bf7ea44f3d9a615b4004ab407d46c02aae8475910722fadd9348a9b8f2181a2739c271a2b2f539d97fe799a4818b4fb81a1271d719