Overview
overview
10Static
static
3eeeeeeeeee...00.exe
windows7-x64
eeeeeeeeee...um.exe
windows7-x64
10eeeeeeeeee...ug.exe
windows7-x64
6eeeeeeeeee...le.exe
windows7-x64
3eeeeeeeeee...er.exe
windows7-x64
7eeeeeeeeee...us.exe
windows7-x64
3MEMZ 3.0/MEMZ.bat
windows7-x64
7MEMZ 3.0/MEMZ.exe
windows7-x64
6eeeeeeeeee...MZ.bat
windows7-x64
7eeeeeeeeee...MZ.exe
windows7-x64
6eeeeeeeeee...ld.exe
windows7-x64
3eeeeeeeeee....A.exe
windows7-x64
6eeeeeeeeee...al.exe
windows7-x64
7eeeeeeeeee...15.exe
windows7-x64
3eeeeeeeeee...al.exe
windows7-x64
7eeeeeeeeee...0r.exe
windows7-x64
10eeeeeeeeee...ro.exe
windows7-x64
eeeeeeeeee...od.exe
windows7-x64
10eeeeeeeeee...ts.dll
windows7-x64
1eeeeeeeeee...ts.dll
windows7-x64
3eeeeeeeeee...ot.exe
windows7-x64
3Resubmissions
15-09-2024 23:12
240915-27aqvsxhjq 815-09-2024 23:02
240915-21efgaxake 815-09-2024 22:58
240915-2xypyaxdkj 315-09-2024 22:56
240915-2wn44sxcpk 315-09-2024 22:43
240915-2np2fawhpr 315-09-2024 22:42
240915-2m3k5swhmk 1015-09-2024 22:33
240915-2gqdmawbja 815-09-2024 22:27
240915-2de4gswekk 715-09-2024 22:15
240915-16esravenh 10Analysis
-
max time kernel
1800s -
max time network
1559s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 22:42
Static task
static1
Behavioral task
behavioral1
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/000/[email protected]
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/Antivirus Platinum/[email protected]
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/ColorBug/[email protected]
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/DesktopPuzzle/[email protected]
Resource
win7-20240903-en
Behavioral task
behavioral5
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/FakeActivation/[email protected]
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/Happy Antivirus/[email protected]
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
MEMZ 3.0/MEMZ.bat
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
MEMZ 3.0/MEMZ.exe
Resource
win7-20240903-en
Behavioral task
behavioral9
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/MEMZ 3.0 (1)/MEMZ 3.0/MEMZ.bat
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/MEMZ 3.0 (1)/MEMZ 3.0/MEMZ.exe
Resource
win7-20240903-en
Behavioral task
behavioral11
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/NavaShield/[email protected]
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/Petya.A/[email protected]
Resource
win7-20240708-en
Behavioral task
behavioral13
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/Security Central/[email protected]
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/Security Defender 2015/[email protected]
Resource
win7-20240903-en
Behavioral task
behavioral15
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/VineMEMZ-Original.exe
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/WannaCrypt0r/[email protected]
Resource
win7-20240708-en
Behavioral task
behavioral17
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/Windows Accelerator Pro/[email protected]
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/Winlocker.VB6.Blacksod/[email protected]
Resource
win7-20240903-en
Behavioral task
behavioral19
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/YouAreAnIdiot/AxInterop.ShockwaveFlashObjects.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/YouAreAnIdiot/Interop.ShockwaveFlashObjects.dll
Resource
win7-20240729-en
Behavioral task
behavioral21
Sample
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/YouAreAnIdiot/YouAreAnIdiot.exe
Resource
win7-20240903-en
General
-
Target
eeeeeeeeeeeeee/Malware_pack_2/Malware_pack_2/Security Central/[email protected]
-
Size
904KB
-
MD5
0315c3149c7dc1d865dc5a89043d870d
-
SHA1
f74546dda99891ca688416b1a61c9637b3794108
-
SHA256
90c2c3944fa8933eefc699cf590ed836086deb31ee56ec71b5651fd978a352c9
-
SHA512
7168dc244f0e400fa302801078e3faec8cdd2d3cb3b8baaab0a1b3c0929d7cf41e54bfbe530ad5ce96a6b63761f7866d26aaae788c3138c34294174091478112
-
SSDEEP
24576:bnQv6Dyxn2Qx0KHizHWKxHuyCcZFyXR1tG:2OE2QtCzhh/7R
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2640 Security Central.exe 2696 Security Central.exe -
Loads dropped DLL 5 IoCs
pid Process 2732 [email protected] 2640 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral13/memory/2732-2-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2732-6-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2732-7-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2732-5-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2732-8-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-24-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2732-25-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-27-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-28-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-26-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-35-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-36-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-37-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-38-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-40-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-41-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-42-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-43-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-44-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-45-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-46-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-47-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-48-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-49-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-50-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-51-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-52-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-53-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-54-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-55-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-56-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-57-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-58-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-59-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-60-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-61-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-62-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-63-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-64-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-65-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-66-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-67-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-68-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-69-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-70-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-71-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-72-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-73-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-74-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-75-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-76-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-77-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-78-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-79-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-80-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-81-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-82-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-83-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-84-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-85-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-86-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-87-0x0000000000400000-0x0000000000A35000-memory.dmp upx behavioral13/memory/2696-88-0x0000000000400000-0x0000000000A35000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Security Central = "C:\\Program Files (x86)\\Security Central\\Security Central.exe" Security Central.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: Security Central.exe File opened (read-only) \??\L: Security Central.exe File opened (read-only) \??\Q: Security Central.exe File opened (read-only) \??\S: Security Central.exe File opened (read-only) \??\V: Security Central.exe File opened (read-only) \??\W: Security Central.exe File opened (read-only) \??\M: Security Central.exe File opened (read-only) \??\N: Security Central.exe File opened (read-only) \??\P: Security Central.exe File opened (read-only) \??\I: Security Central.exe File opened (read-only) \??\J: Security Central.exe File opened (read-only) \??\O: Security Central.exe File opened (read-only) \??\U: Security Central.exe File opened (read-only) \??\X: Security Central.exe File opened (read-only) \??\Z: Security Central.exe File opened (read-only) \??\G: Security Central.exe File opened (read-only) \??\H: Security Central.exe File opened (read-only) \??\K: Security Central.exe File opened (read-only) \??\R: Security Central.exe File opened (read-only) \??\T: Security Central.exe File opened (read-only) \??\Y: Security Central.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2644 set thread context of 2732 2644 [email protected] 30 PID 2640 set thread context of 2696 2640 Security Central.exe 32 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Security Central\Security Central.exe [email protected] -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Security Central.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Security Central.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2696 Security Central.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 1712 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1712 AUDIODG.EXE Token: 33 1712 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1712 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe -
Suspicious use of SendNotifyMessage 34 IoCs
pid Process 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2644 [email protected] 2640 Security Central.exe 2696 Security Central.exe 2696 Security Central.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2732 2644 [email protected] 30 PID 2644 wrote to memory of 2732 2644 [email protected] 30 PID 2644 wrote to memory of 2732 2644 [email protected] 30 PID 2644 wrote to memory of 2732 2644 [email protected] 30 PID 2644 wrote to memory of 2732 2644 [email protected] 30 PID 2644 wrote to memory of 2732 2644 [email protected] 30 PID 2644 wrote to memory of 2732 2644 [email protected] 30 PID 2644 wrote to memory of 2732 2644 [email protected] 30 PID 2644 wrote to memory of 2732 2644 [email protected] 30 PID 2732 wrote to memory of 2640 2732 [email protected] 31 PID 2732 wrote to memory of 2640 2732 [email protected] 31 PID 2732 wrote to memory of 2640 2732 [email protected] 31 PID 2732 wrote to memory of 2640 2732 [email protected] 31 PID 2640 wrote to memory of 2696 2640 Security Central.exe 32 PID 2640 wrote to memory of 2696 2640 Security Central.exe 32 PID 2640 wrote to memory of 2696 2640 Security Central.exe 32 PID 2640 wrote to memory of 2696 2640 Security Central.exe 32 PID 2640 wrote to memory of 2696 2640 Security Central.exe 32 PID 2640 wrote to memory of 2696 2640 Security Central.exe 32 PID 2640 wrote to memory of 2696 2640 Security Central.exe 32 PID 2640 wrote to memory of 2696 2640 Security Central.exe 32 PID 2640 wrote to memory of 2696 2640 Security Central.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\eeeeeeeeeeeeee\Malware_pack_2\Malware_pack_2\Security Central\[email protected]"C:\Users\Admin\AppData\Local\Temp\eeeeeeeeeeeeee\Malware_pack_2\Malware_pack_2\Security Central\[email protected]"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\eeeeeeeeeeeeee\Malware_pack_2\Malware_pack_2\Security Central\[email protected]"C:\Users\Admin\AppData\Local\Temp\eeeeeeeeeeeeee\Malware_pack_2\Malware_pack_2\Security Central\[email protected]"2⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Program Files (x86)\Security Central\Security Central.exe"C:\Program Files (x86)\Security Central\Security Central.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Program Files (x86)\Security Central\Security Central.exe"C:\Program Files (x86)\Security Central\Security Central.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2696
-
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5a41⤵
- Suspicious use of AdjustPrivilegeToken
PID:1712
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
904KB
MD50315c3149c7dc1d865dc5a89043d870d
SHA1f74546dda99891ca688416b1a61c9637b3794108
SHA25690c2c3944fa8933eefc699cf590ed836086deb31ee56ec71b5651fd978a352c9
SHA5127168dc244f0e400fa302801078e3faec8cdd2d3cb3b8baaab0a1b3c0929d7cf41e54bfbe530ad5ce96a6b63761f7866d26aaae788c3138c34294174091478112