File name:

memenite-master.zip

Full analysis: https://app.any.run/tasks/961987c2-9efc-4207-b814-dcb7d7e05d7f
Verdict: Malicious activity
Analysis date: May 09, 2025, 23:15:02
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
iqvw64e-sys
vuln-driver
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract, compression method=store
MD5:

6F58E964634CE4DC1C189E1324EF415A

SHA1:

CF08D595ED35EEFD2FBD1955301066697F85BF33

SHA256:

4F98137A7D8CEA117FE163661D28F4A4F8CBDC93187BC21456BC9B9446E18015

SSDEEP:

196608:2vAIDVEz/Bb6g5N1nFv3CLJUM2HBpQVBX64ZEcY2cEy3eagDn9nAhg5/kuTZhRDZ:IAImz/dR5N1FvS+M2HBpqZER2cleagDH

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Vulnerable driver has been detected

      • mapdriver.exe (PID: 6252)
      • loadcheat.exe (PID: 5048)
  • SUSPICIOUS

    • Application launched itself

      • cmd.exe (PID: 1272)
      • cmd.exe (PID: 6584)
    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 7152)
    • Starts CMD.EXE for commands execution

      • cmd.exe (PID: 1272)
      • loadcheat.exe (PID: 5048)
      • cmd.exe (PID: 6584)
    • Drops a system driver (possible attempt to evade defenses)

      • mapper.exe (PID: 2284)
      • WinRAR.exe (PID: 1244)
      • mapper.exe (PID: 1168)
      • loadcheat.exe (PID: 5048)
      • mapper.exe (PID: 2104)
      • mapdriver.exe (PID: 6252)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 5984)
      • cmd.exe (PID: 2416)
      • cmd.exe (PID: 3008)
      • cmd.exe (PID: 3176)
      • cmd.exe (PID: 6576)
    • Executable content was dropped or overwritten

      • mapper.exe (PID: 2284)
      • mapper.exe (PID: 1168)
      • mapdriver.exe (PID: 6252)
      • loadcheat.exe (PID: 5048)
      • mapper.exe (PID: 2104)
    • Executing commands from a ".bat" file

      • cmd.exe (PID: 1272)
      • cmd.exe (PID: 6584)
    • Creates or modifies Windows services

      • mapper.exe (PID: 1168)
      • mapper.exe (PID: 2104)
      • mapper.exe (PID: 2284)
    • Creates files in the driver directory

      • mapper.exe (PID: 1168)
      • mapper.exe (PID: 2104)
      • mapper.exe (PID: 2284)
    • Uses TASKKILL.EXE to kill process

      • cmd.exe (PID: 6392)
      • cmd.exe (PID: 2240)
      • cmd.exe (PID: 2100)
      • cmd.exe (PID: 208)
      • cmd.exe (PID: 5072)
    • Stops a currently running service

      • sc.exe (PID: 6148)
      • sc.exe (PID: 3800)
      • sc.exe (PID: 5116)
      • sc.exe (PID: 2096)
    • Starts SC.EXE for service management

      • cmd.exe (PID: 5188)
      • cmd.exe (PID: 3240)
      • cmd.exe (PID: 5936)
      • cmd.exe (PID: 5640)
    • Uses WMIC.EXE to obtain physical disk drive information

      • cmd.exe (PID: 6584)
    • Uses WMIC.EXE to obtain memory chip information

      • cmd.exe (PID: 6584)
    • Uses WMIC.EXE to obtain data on the base board management (motherboard or system board)

      • cmd.exe (PID: 6584)
  • INFO

    • The sample compiled with english language support

      • WinRAR.exe (PID: 7152)
      • WinRAR.exe (PID: 1244)
      • mapdriver.exe (PID: 6252)
      • loadcheat.exe (PID: 5048)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 1244)
    • Manual execution by a user

      • cmd.exe (PID: 1272)
      • WinRAR.exe (PID: 1244)
      • mapper.exe (PID: 4696)
      • mapdriver.exe (PID: 6252)
      • mapdriver.exe (PID: 6156)
      • loadcheat.exe (PID: 5988)
      • loadcheat.exe (PID: 5048)
      • cmd.exe (PID: 6584)
      • mapper.exe (PID: 2104)
      • mapper.exe (PID: 1328)
      • mapper.exe (PID: 1168)
    • Checks supported languages

      • mapper.exe (PID: 2284)
      • mapdriver.exe (PID: 6252)
      • mapper.exe (PID: 1168)
      • loadcheat.exe (PID: 5048)
      • mapper.exe (PID: 6456)
      • mapper.exe (PID: 2104)
    • Reads the computer name

      • mapper.exe (PID: 2284)
      • mapdriver.exe (PID: 6252)
      • loadcheat.exe (PID: 5048)
      • mapper.exe (PID: 2104)
      • mapper.exe (PID: 1168)
    • Create files in a temporary directory

      • mapdriver.exe (PID: 6252)
      • loadcheat.exe (PID: 5048)
    • Checks proxy server information

      • slui.exe (PID: 3140)
    • Reads the software policy settings

      • slui.exe (PID: 3140)
      • slui.exe (PID: 2852)
    • Reads security settings of Internet Explorer

      • WMIC.exe (PID: 4220)
      • WMIC.exe (PID: 4284)
      • WMIC.exe (PID: 4212)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 10
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2020:03:03 21:45:52
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: memenite-master/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
198
Monitored processes
65
Malicious processes
7
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe no specs sppextcomobj.exe no specs slui.exe winrar.exe rundll32.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs findstr.exe no specs mapper.exe no specs mapper.exe no specs mapper.exe conhost.exe no specs slui.exe mapper.exe no specs mapper.exe conhost.exe no specs mapdriver.exe no specs THREAT mapdriver.exe loadcheat.exe no specs THREAT loadcheat.exe cmd.exe no specs conhost.exe no specs taskkill.exe no specs cmd.exe no specs conhost.exe no specs taskkill.exe no specs cmd.exe no specs conhost.exe no specs taskkill.exe no specs cmd.exe no specs conhost.exe no specs taskkill.exe no specs cmd.exe no specs conhost.exe no specs taskkill.exe no specs cmd.exe no specs conhost.exe no specs sc.exe no specs cmd.exe no specs conhost.exe no specs sc.exe no specs cmd.exe no specs conhost.exe no specs sc.exe no specs cmd.exe no specs conhost.exe no specs sc.exe no specs cmd.exe conhost.exe no specs cmd.exe no specs findstr.exe no specs wmic.exe no specs wmic.exe no specs wmic.exe no specs cmd.exe no specs findstr.exe no specs cmd.exe no specs findstr.exe no specs mapper.exe no specs cmd.exe no specs findstr.exe no specs mapper.exe no specs mapper.exe conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
208C:\WINDOWS\system32\cmd.exe /c taskkill /f /im EpicGamesLauncher.exeC:\Windows\System32\cmd.exeloadcheat.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
128
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
616findstr /b /c:":menu_" "C:\Users\admin\Desktop\memenite-master\Run me.bat"C:\Windows\System32\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Find String (QGREP) Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
924findstr /b /c:":menu_" "C:\Users\admin\Desktop\memenite-master\Run me.bat"C:\Windows\System32\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Find String (QGREP) Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
968\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1040C:\Users\admin\Desktop\memenite-master\mapper.exe spoofer.sysC:\Users\admin\Desktop\memenite-master\mapper.execmd.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\desktop\memenite-master\mapper.exe
c:\windows\system32\ntdll.dll
1052C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
1168"C:\Users\admin\Desktop\memenite-master\mapper.exe" C:\Users\admin\Desktop\memenite-master\spoofer.sysC:\Users\admin\Desktop\memenite-master\mapper.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
4294967295
Modules
Images
c:\users\admin\desktop\memenite-master\mapper.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1244"C:\Program Files\WinRAR\WinRAR.exe" x -iext -ow -ver -- "C:\Users\admin\Desktop\memenite-master.zip" C:\Users\admin\Desktop\C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
1272C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\Desktop\memenite-master\Run me.bat" "C:\Windows\System32\cmd.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
3221225786
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cmdext.dll
c:\windows\system32\advapi32.dll
1328"C:\Users\admin\Desktop\memenite-master\mapper.exe" C:\Users\admin\Desktop\memenite-master\spoofer.sysC:\Users\admin\Desktop\memenite-master\mapper.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\desktop\memenite-master\mapper.exe
c:\windows\system32\ntdll.dll
Total events
6 157
Read events
6 115
Write events
39
Delete events
3

Modification events

(PID) Process:(7152) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(7152) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(7152) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(7152) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\memenite-master.zip
(PID) Process:(7152) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(7152) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(7152) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(7152) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(7152) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Comment
Operation:writeName:LeftBorder
Value:
472
(PID) Process:(7152) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths
Operation:writeName:name
Value:
256
Executable files
12
Suspicious files
0
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
2284mapper.exeC:\Windows\System32\drivers\L3APD.sysexecutable
MD5:C599F45FD550301593675B711CEC0794
SHA256:E446BE684F7FC7FC674DFDCEEB49838087DAD15A282DD047EF15B13F581549D7
1244WinRAR.exeC:\Users\admin\Desktop\memenite-master\mapper.exeexecutable
MD5:8D68BF555643D03CC0A254199581D2A0
SHA256:9B2AA35E6EEF2F49691BBD69DDAF23D88005F3F6E3F4CFFDF9BFC0DCCEFDCE25
2104mapper.exeC:\Windows\System32\drivers\L3APD.sysexecutable
MD5:C599F45FD550301593675B711CEC0794
SHA256:E446BE684F7FC7FC674DFDCEEB49838087DAD15A282DD047EF15B13F581549D7
1244WinRAR.exeC:\Users\admin\Desktop\memenite-master\Run me.battext
MD5:4C3F1F1A63102A7B6F8167A95D2DC975
SHA256:2249ECF66BAECE44E152EEDD9C2E10C9593FDEDB22265B1246D096DD323D522B
1244WinRAR.exeC:\Users\admin\Desktop\memenite-master\README.mdtext
MD5:50BD31342101CA04692FB277CE3BE1C4
SHA256:F38799A1D9D0608A08A1C715F0837DD91DCB820396847C4161A10BF0BE560337
1244WinRAR.exeC:\Users\admin\Desktop\memenite-master\mapdriver.exeexecutable
MD5:8C564C612E0C026FB381A1EDC06E3677
SHA256:8164305213E548256184AAF8830875FC7020F2C595AACCCAB5C13F70621AB844
1168mapper.exeC:\Windows\System32\drivers\L3APD.sysexecutable
MD5:C599F45FD550301593675B711CEC0794
SHA256:E446BE684F7FC7FC674DFDCEEB49838087DAD15A282DD047EF15B13F581549D7
1244WinRAR.exeC:\Users\admin\Desktop\memenite-master\VSTXRAID.SYSexecutable
MD5:A6CEC1A878536F3D5C82CFDF6E4CFCB9
SHA256:A569744957E492042994C6F1312C8F4EC2F20A559BD8938A6A09C15230DEBBDC
6252mapdriver.exeC:\Users\admin\AppData\Local\Temp\iqvw64e.sysexecutable
MD5:1898CEDA3247213C084F43637EF163B3
SHA256:4429F32DB1CC70567919D7D47B844A91CF1329A6CD116F582305F3B7B60CD60B
1244WinRAR.exeC:\Users\admin\Desktop\memenite-master\spoofer.sysexecutable
MD5:96756DEAFF1B2667883D4A21E43F4F65
SHA256:1992C044963F5C77AA7B5462E2BB69A37C66BC0E13032524FB1663C0314FD420
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
21
DNS requests
16
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.16.168.114:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1072
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
1072
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
2.16.168.114:80
crl.microsoft.com
Akamai International B.V.
RU
whitelisted
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
40.126.31.3:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1072
SIHClient.exe
4.175.87.197:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 2.16.168.114
  • 2.16.168.124
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 184.30.21.171
whitelisted
google.com
  • 172.217.16.206
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
login.live.com
  • 40.126.31.3
  • 20.190.159.0
  • 40.126.31.128
  • 20.190.159.73
  • 20.190.159.2
  • 20.190.159.128
  • 20.190.159.23
  • 20.190.159.75
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 40.69.42.241
whitelisted
activation-v2.sls.microsoft.com
  • 20.83.72.98
  • 40.91.76.224
whitelisted

Threats

No threats detected
No debug info