Analysis
-
max time kernel
149s -
max time network
108s -
platform
windows11-21h2_x64 -
resource
win11-20250313-en -
resource tags
arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system -
submitted
27/03/2025, 19:44
Static task
static1
Behavioral task
behavioral1
Sample
Conker Free V6/1-Turn_On_Wifi.bat
Resource
win11-20250313-en
Behavioral task
behavioral2
Sample
Conker Free V6/Conker Free V6.bat
Resource
win11-20250314-en
Behavioral task
behavioral3
Sample
Conker Free V6/Memreduct/memreduct-3.4-setup.exe
Resource
win11-20250313-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win11-20250313-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win11-20250313-en
Behavioral task
behavioral6
Sample
memreduct.exe
Resource
win11-20250313-en
General
-
Target
memreduct.exe
-
Size
290KB
-
MD5
bfbe78d329b87dd1d5ae51707fdf928b
-
SHA1
015c758391b620dee72625ed59b522c06f6457d7
-
SHA256
31689824dd984bd9c0f07c20f05bc253f6d107581aec4609044fddcdd50f655d
-
SHA512
e950551d53e50a0296a60730c0cc2ee029ef9026159e159bee9bb29a0f19756f5167f77c4024854fd58bede7ff8051ac4a2f5acf55443ed29c381e909fd04e5a
-
SSDEEP
3072:KV+VDeAxsOc8WdE7KEgD3fN/FZgTMJNa22IR9Lp3FhMd08Xevd0pG46tBHa/FgFj:WQitu7K3rfnh2IRNxfTv69
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3000 update-memreduct-udrynyasy.exe 2132 memreduct.exe -
Loads dropped DLL 1 IoCs
pid Process 3000 update-memreduct-udrynyasy.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 1 raw.githubusercontent.com 2 raw.githubusercontent.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language update-memreduct-udrynyasy.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4924 memreduct.exe Token: SeProfSingleProcessPrivilege 4924 memreduct.exe Token: SeProfSingleProcessPrivilege 2132 memreduct.exe Token: SeIncreaseQuotaPrivilege 2132 memreduct.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4924 memreduct.exe 4924 memreduct.exe 4924 memreduct.exe 4924 memreduct.exe 4924 memreduct.exe 4924 memreduct.exe 4924 memreduct.exe 4924 memreduct.exe 4924 memreduct.exe 4924 memreduct.exe 4924 memreduct.exe 4924 memreduct.exe 4924 memreduct.exe 4924 memreduct.exe 4924 memreduct.exe 4924 memreduct.exe 4924 memreduct.exe 4924 memreduct.exe 4924 memreduct.exe 4924 memreduct.exe 4924 memreduct.exe 4924 memreduct.exe 4924 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4924 memreduct.exe 4924 memreduct.exe 4924 memreduct.exe 4924 memreduct.exe 4924 memreduct.exe 4924 memreduct.exe 4924 memreduct.exe 4924 memreduct.exe 4924 memreduct.exe 4924 memreduct.exe 4924 memreduct.exe 4924 memreduct.exe 4924 memreduct.exe 4924 memreduct.exe 4924 memreduct.exe 4924 memreduct.exe 4924 memreduct.exe 4924 memreduct.exe 4924 memreduct.exe 4924 memreduct.exe 4924 memreduct.exe 4924 memreduct.exe 4924 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe 2132 memreduct.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4924 wrote to memory of 3000 4924 memreduct.exe 79 PID 4924 wrote to memory of 3000 4924 memreduct.exe 79 PID 4924 wrote to memory of 3000 4924 memreduct.exe 79 PID 3000 wrote to memory of 2132 3000 update-memreduct-udrynyasy.exe 80 PID 3000 wrote to memory of 2132 3000 update-memreduct-udrynyasy.exe 80 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\memreduct.exe"C:\Users\Admin\AppData\Local\Temp\memreduct.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Users\Admin\AppData\Roaming\Henry++\Mem Reduct\cache\update-memreduct-udrynyasy.exe"C:\Users\Admin\AppData\Roaming\Henry++\Mem Reduct\cache\update-memreduct-udrynyasy.exe" "C:\Users\Admin\AppData\Roaming\Henry++\Mem Reduct\cache\update-memreduct-udrynyasy.exe" /u /S /D=C:\Users\Admin\AppData\Local\Temp2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\memreduct.exe"C:\Users\Admin\AppData\Local\Temp\memreduct.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2132
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
380KB
MD517718ec34143a262e29c6765c7c1e9b3
SHA165c2058ba84fb811b0f169a84c8937acd8b3f03d
SHA2568e7a54b08939981818c04b22f6755a6cd038438f77cc1541b8b449afeb472f95
SHA512061f6591bad1f5abf0d0bd23b00b0181e6f67361fbc4a485af7c29dce80e9fe72b5be9cd0622111df23a39b99c5ebf591c945b7651f74f95bc6b3d4a38e8584a
-
Filesize
114KB
MD5e821e852e3fe8d8687cfbec26ab73de8
SHA1b091fd9854436c8d765a28245fb321388dff7968
SHA256d983a2f8bd38fdcf470806230675ff91a1f8d0be9790129b3b6cb61e81409b4e
SHA512e65db0b3386740cde3623b36ce7a85190791925879338997ebaed344a82519ed503763b4a302004abae2b32608b943f2c2a76ee09d3f611080fc86bad439647d
-
Filesize
12KB
MD5192639861e3dc2dc5c08bb8f8c7260d5
SHA158d30e460609e22fa0098bc27d928b689ef9af78
SHA25623d618a0293c78ce00f7c6e6dd8b8923621da7dd1f63a070163ef4c0ec3033d6
SHA5126e573d8b2ef6ed719e271fd0b2fd9cd451f61fc9a9459330108d6d7a65a0f64016303318cad787aa1d5334ba670d8f1c7c13074e1be550b4a316963ecc465cdc
-
Filesize
370KB
MD5a5dc96f2502aa056c6b995fb41d86ce9
SHA1ea91f150a3a4b20608e7b34531c4c8c2270b3642
SHA2564bbcf0c047c91784dc3016349b8dc8d2472b1df6ce282994376cd729c1d17bb5
SHA5122397c9657fa795f8fb9655b3b1af012ec90176ffb1d45b7a7acd12e61d937cd749f8a37ac0e57222128a2506a8945f8faf14bf3503a844461fe7b8ddd6985c05
-
Filesize
42B
MD561eb9fa5fe71c6ebe0e5c5c7d373f196
SHA1f3abb8ee38313ecf846d281707f5c68d4adc5524
SHA2561c3055379a4f3e3b856a72f89e894348f4c7b33c430bb1f8537fc55b34d4dd1c
SHA512028860cf1b6c7b507f77ddb933127e497c94e92cfa204ab43544628514afab1b0ff858c3c2a9b28775d5d09ff100ca1ed56d21ef19ca36389e03b11659d860b2