URL:

https://github.com/OwO-Studio/MEMZ-4.0/archive/master.zip

Full analysis: https://app.any.run/tasks/412e3113-9c90-4198-a77a-d7afc3e0f9e6
Verdict: Malicious activity
Analysis date: May 19, 2020, 14:36:01
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

42DECB4F92B8BABD5CBDCCC5B9E9F4F3

SHA1:

B8DE472A3D4E6180875A29EADA2AB63B9D1A05DD

SHA256:

C3F050C4ED10B45A23A5BB275F27D6A7D062E4665370674B5E220F303371C5EC

SSDEEP:

3:N8tEdUI2gMFhKATJo:2uu1Fc2Jo

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • MEMZ.exe (PID: 3044)
      • MEMZ-Destructive.exe (PID: 2280)
      • MEMZ.exe (PID: 2720)
      • MEMZ-Destructive.exe (PID: 3456)
      • MEMZ.exe (PID: 3616)
      • MEMZ.exe (PID: 1392)
      • MEMZ.exe (PID: 1432)
      • MEMZ.exe (PID: 3584)
      • MEMZ.exe (PID: 3808)
      • MEMZ.exe (PID: 576)
      • MEMZ.exe (PID: 2932)
    • Low-level write access rights to disk partition

      • MEMZ.exe (PID: 576)
  • SUSPICIOUS

    • Executes scripts

      • cmd.exe (PID: 2880)
    • Creates files in the user directory

      • cscript.exe (PID: 2316)
    • Executable content was dropped or overwritten

      • cscript.exe (PID: 2316)
      • WinRAR.exe (PID: 3488)
    • Starts CMD.EXE for commands execution

      • WinRAR.exe (PID: 3488)
    • Application launched itself

      • MEMZ.exe (PID: 3616)
    • Low-level read access rights to disk partition

      • MEMZ.exe (PID: 576)
  • INFO

    • Application launched itself

      • iexplore.exe (PID: 2708)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 2708)
      • iexplore.exe (PID: 3648)
    • Modifies the phishing filter of IE

      • iexplore.exe (PID: 2708)
    • Changes internet zones settings

      • iexplore.exe (PID: 2708)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 3648)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
62
Monitored processes
17
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe no specs iexplore.exe winrar.exe cmd.exe no specs cscript.exe memz.exe no specs memz-destructive.exe no specs memz.exe no specs memz-destructive.exe memz.exe memz.exe no specs memz.exe no specs memz.exe no specs memz.exe no specs memz.exe no specs memz.exe notepad.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
576"C:\Users\admin\AppData\Roaming\MEMZ.exe" /mainC:\Users\admin\AppData\Roaming\MEMZ.exe
MEMZ.exe
User:
admin
Integrity Level:
HIGH
Exit code:
1073807364
Modules
Images
c:\users\admin\appdata\roaming\memz.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
1392"C:\Users\admin\AppData\Roaming\MEMZ.exe" /watchdogC:\Users\admin\AppData\Roaming\MEMZ.exeMEMZ.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\roaming\memz.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
1432"C:\Users\admin\AppData\Roaming\MEMZ.exe" /watchdogC:\Users\admin\AppData\Roaming\MEMZ.exeMEMZ.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\roaming\memz.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
1708"C:\Windows\System32\notepad.exe" \note.txtC:\Windows\System32\notepad.exeMEMZ.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\notepad.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2280"C:\Users\admin\AppData\Local\Temp\Rar$EXa3488.33210\MEMZ-4.0-master\MEMZ-Destructive.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3488.33210\MEMZ-4.0-master\MEMZ-Destructive.exeWinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa3488.33210\memz-4.0-master\memz-destructive.exe
c:\systemroot\system32\ntdll.dll
2316cscript x.js C:\Windows\system32\cscript.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Console Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\cscript.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
2708"C:\Program Files\Internet Explorer\iexplore.exe" "https://github.com/OwO-Studio/MEMZ-4.0/archive/master.zip"C:\Program Files\Internet Explorer\iexplore.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
2720"C:\Users\admin\AppData\Roaming\MEMZ.exe" C:\Users\admin\AppData\Roaming\MEMZ.execmd.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\appdata\roaming\memz.exe
c:\systemroot\system32\ntdll.dll
2880cmd /c ""C:\Users\admin\AppData\Local\Temp\Rar$DIa3488.32925\MEMZ-Destructive.bat" "C:\Windows\system32\cmd.exeWinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2932"C:\Users\admin\AppData\Roaming\MEMZ.exe" /watchdogC:\Users\admin\AppData\Roaming\MEMZ.exeMEMZ.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\roaming\memz.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
Total events
2 186
Read events
2 087
Write events
99
Delete events
0

Modification events

(PID) Process:(2708) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
4021339496
(PID) Process:(2708) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30813674
(PID) Process:(2708) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(2708) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2708) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2708) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(2708) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2708) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
(PID) Process:(2708) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2708) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
Executable files
3
Suspicious files
13
Text files
74
Unknown types
3

Dropped files

PID
Process
Filename
Type
3648iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Cab8C12.tmp
MD5:
SHA256:
3648iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Tar8C13.tmp
MD5:
SHA256:
2708iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF7B45E620F94AE527.TMP
MD5:
SHA256:
2708iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\MEMZ-4.0-master.zip.2h29jjr.partial:Zone.Identifier
MD5:
SHA256:
3648iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\35DDEDF268117918D1D277A171D8DF7B_194FE46C1DB194819C88131C80396FC3der
MD5:1B01FECBA98C70B6B794D48D42652C01
SHA256:362FA55BEC83B709FA55B2921D45DF79F37181961603D55DF053C75B8CB155D8
3648iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C20E0DA2D0F89FE526E1490F4A2EE5ABbinary
MD5:63162587A825F3BDC918F5B7B9BD35E2
SHA256:BB05A7B5A9EB16F0D172EE52EF3510B667C6A3CF16BE90726A1CB3CA45E5D1B1
3648iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\MEMZ-4.0-master[1].zipcompressed
MD5:743B44C0FC9F2E3773F1FEC13A6E5CCC
SHA256:8B79F7D48F5178B2CF887A06A18D8D010ED588A9D4CBC4E1B0F8F06F25A42A68
3648iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\35DDEDF268117918D1D277A171D8DF7B_B00CE8D5D4CF0E959CFDB61F636A135Dbinary
MD5:2B9A9B8B480D1A2093CDDE16B725325C
SHA256:903CE9943E1534FD3581E90AA06A6F1D7462732D2BD283052A861F53C98D0B2F
3648iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EDC238BFF48A31D55A97E1E93892934B_C20E0DA2D0F89FE526E1490F4A2EE5ABder
MD5:1D0EA7C59777B289090DC72A2309F0DE
SHA256:BADC0963C4A7404B3CC252F8A4746C799502D2EC47188740A8420E11CB5A2D15
2880cmd.exeC:\Users\admin\Desktop\x.jstext
MD5:D641E7FDE83607132C4B3A63F316BB11
SHA256:5B1BFD5076A611C0BF421056E1908F86BE2E9E98B99B7C4E0BB42A758FC38E0E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
6
DNS requests
4
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3648
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTPJvUY%2Bsl%2Bj4yzQuAcL2oQno5fCgQUUWj%2FkK8CB3U8zNllZGKiErhZcjsCEAM3CrYov5jSu83hwnl9RjQ%3D
US
der
471 b
whitelisted
3648
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfqhLjKLEJQZPin0KCzkdAQpVYowQUsT7DaQP4v0cB1JgmGggC72NkK8MCEATh56TcXPLzbcArQrhdFZ8%3D
US
der
471 b
whitelisted
3648
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTPJvUY%2Bsl%2Bj4yzQuAcL2oQno5fCgQUUWj%2FkK8CB3U8zNllZGKiErhZcjsCEAVXyAsoJoOhewoRRJMpa3k%3D
US
der
471 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3648
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3648
iexplore.exe
140.82.113.9:443
codeload.github.com
US
unknown
3648
iexplore.exe
140.82.114.3:443
github.com
US
suspicious

DNS requests

Domain
IP
Reputation
github.com
  • 140.82.114.3
malicious
ocsp.digicert.com
  • 93.184.220.29
whitelisted
codeload.github.com
  • 140.82.113.9
whitelisted

Threats

No threats detected
No debug info