URL:

https://github.com/OwO-Studio/MEMZ-4.0/archive/master.zip

Full analysis: https://app.any.run/tasks/412e3113-9c90-4198-a77a-d7afc3e0f9e6
Verdict: Malicious activity
Analysis date: May 19, 2020, 14:36:01
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

42DECB4F92B8BABD5CBDCCC5B9E9F4F3

SHA1:

B8DE472A3D4E6180875A29EADA2AB63B9D1A05DD

SHA256:

C3F050C4ED10B45A23A5BB275F27D6A7D062E4665370674B5E220F303371C5EC

SSDEEP:

3:N8tEdUI2gMFhKATJo:2uu1Fc2Jo

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • MEMZ.exe (PID: 3044)
      • MEMZ-Destructive.exe (PID: 2280)
      • MEMZ.exe (PID: 1432)
      • MEMZ.exe (PID: 3616)
      • MEMZ.exe (PID: 3584)
      • MEMZ-Destructive.exe (PID: 3456)
      • MEMZ.exe (PID: 3808)
      • MEMZ.exe (PID: 2720)
      • MEMZ.exe (PID: 1392)
      • MEMZ.exe (PID: 2932)
      • MEMZ.exe (PID: 576)
    • Low-level write access rights to disk partition

      • MEMZ.exe (PID: 576)
  • SUSPICIOUS

    • Creates files in the user directory

      • cscript.exe (PID: 2316)
    • Executes scripts

      • cmd.exe (PID: 2880)
    • Executable content was dropped or overwritten

      • cscript.exe (PID: 2316)
      • WinRAR.exe (PID: 3488)
    • Starts CMD.EXE for commands execution

      • WinRAR.exe (PID: 3488)
    • Application launched itself

      • MEMZ.exe (PID: 3616)
    • Low-level read access rights to disk partition

      • MEMZ.exe (PID: 576)
  • INFO

    • Changes internet zones settings

      • iexplore.exe (PID: 2708)
    • Modifies the phishing filter of IE

      • iexplore.exe (PID: 2708)
    • Application launched itself

      • iexplore.exe (PID: 2708)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 2708)
      • iexplore.exe (PID: 3648)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 3648)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
62
Monitored processes
17
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start drop and start iexplore.exe no specs iexplore.exe winrar.exe cmd.exe no specs cscript.exe memz.exe no specs memz-destructive.exe no specs memz.exe no specs memz-destructive.exe memz.exe memz.exe no specs memz.exe no specs memz.exe no specs memz.exe no specs memz.exe no specs memz.exe notepad.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2708"C:\Program Files\Internet Explorer\iexplore.exe" "https://github.com/OwO-Studio/MEMZ-4.0/archive/master.zip"C:\Program Files\Internet Explorer\iexplore.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
3648"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2708 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
3488"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\MEMZ-4.0-master.zip"C:\Program Files\WinRAR\WinRAR.exe
iexplore.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2880cmd /c ""C:\Users\admin\AppData\Local\Temp\Rar$DIa3488.32925\MEMZ-Destructive.bat" "C:\Windows\system32\cmd.exeWinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2316cscript x.js C:\Windows\system32\cscript.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Console Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\cscript.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
3044"C:\Users\admin\AppData\Roaming\MEMZ.exe" C:\Users\admin\AppData\Roaming\MEMZ.execmd.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\appdata\roaming\memz.exe
c:\systemroot\system32\ntdll.dll
2280"C:\Users\admin\AppData\Local\Temp\Rar$EXa3488.33210\MEMZ-4.0-master\MEMZ-Destructive.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3488.33210\MEMZ-4.0-master\MEMZ-Destructive.exeWinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa3488.33210\memz-4.0-master\memz-destructive.exe
c:\systemroot\system32\ntdll.dll
2720"C:\Users\admin\AppData\Roaming\MEMZ.exe" C:\Users\admin\AppData\Roaming\MEMZ.execmd.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\appdata\roaming\memz.exe
c:\systemroot\system32\ntdll.dll
3456"C:\Users\admin\AppData\Local\Temp\Rar$EXa3488.33210\MEMZ-4.0-master\MEMZ-Destructive.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3488.33210\MEMZ-4.0-master\MEMZ-Destructive.exe
WinRAR.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa3488.33210\memz-4.0-master\memz-destructive.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
3616"C:\Users\admin\AppData\Roaming\MEMZ.exe" C:\Users\admin\AppData\Roaming\MEMZ.exe
cmd.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\roaming\memz.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
Total events
2 186
Read events
2 087
Write events
99
Delete events
0

Modification events

(PID) Process:(2708) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
4021339496
(PID) Process:(2708) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30813674
(PID) Process:(2708) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(2708) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2708) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2708) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(2708) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2708) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
(PID) Process:(2708) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2708) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
Executable files
3
Suspicious files
13
Text files
74
Unknown types
3

Dropped files

PID
Process
Filename
Type
3648iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Cab8C12.tmp
MD5:
SHA256:
3648iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Tar8C13.tmp
MD5:
SHA256:
2708iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF7B45E620F94AE527.TMP
MD5:
SHA256:
2708iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\MEMZ-4.0-master.zip.2h29jjr.partial:Zone.Identifier
MD5:
SHA256:
3648iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\35DDEDF268117918D1D277A171D8DF7B_B00CE8D5D4CF0E959CFDB61F636A135Dbinary
MD5:2B9A9B8B480D1A2093CDDE16B725325C
SHA256:903CE9943E1534FD3581E90AA06A6F1D7462732D2BD283052A861F53C98D0B2F
2708iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\{1B6D6029-99DE-11EA-972D-5254004A04AF}.datbinary
MD5:0D5977B2DF11C8F21B4F66F30F859CED
SHA256:12CB5B86506664CB5E9842A74216BA35E2786EBEA8AFC4BB2A94D9FF170857BC
3648iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\35DDEDF268117918D1D277A171D8DF7B_194FE46C1DB194819C88131C80396FC3binary
MD5:37C25131E1BC4F5D7A18B99961216D44
SHA256:5211AAD6CA2B147D0B710E6A4B464E823EED7D84883C3820A5EFB852CA2EFE62
3648iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EDC238BFF48A31D55A97E1E93892934B_C20E0DA2D0F89FE526E1490F4A2EE5ABder
MD5:1D0EA7C59777B289090DC72A2309F0DE
SHA256:BADC0963C4A7404B3CC252F8A4746C799502D2EC47188740A8420E11CB5A2D15
3648iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C20E0DA2D0F89FE526E1490F4A2EE5ABbinary
MD5:63162587A825F3BDC918F5B7B9BD35E2
SHA256:BB05A7B5A9EB16F0D172EE52EF3510B667C6A3CF16BE90726A1CB3CA45E5D1B1
2880cmd.exeC:\Users\admin\Desktop\xtext
MD5:1882F3DD051E401349F1AF58D55B0A37
SHA256:3C8CEA1A86F07B018E637A1EA2649D907573F78C7E4025EF7E514362D09FF6C0
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
6
DNS requests
4
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3648
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTPJvUY%2Bsl%2Bj4yzQuAcL2oQno5fCgQUUWj%2FkK8CB3U8zNllZGKiErhZcjsCEAVXyAsoJoOhewoRRJMpa3k%3D
US
der
471 b
whitelisted
3648
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfqhLjKLEJQZPin0KCzkdAQpVYowQUsT7DaQP4v0cB1JgmGggC72NkK8MCEATh56TcXPLzbcArQrhdFZ8%3D
US
der
471 b
whitelisted
3648
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTPJvUY%2Bsl%2Bj4yzQuAcL2oQno5fCgQUUWj%2FkK8CB3U8zNllZGKiErhZcjsCEAM3CrYov5jSu83hwnl9RjQ%3D
US
der
471 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3648
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3648
iexplore.exe
140.82.114.3:443
github.com
US
suspicious
3648
iexplore.exe
140.82.113.9:443
codeload.github.com
US
unknown

DNS requests

Domain
IP
Reputation
github.com
  • 140.82.114.3
malicious
ocsp.digicert.com
  • 93.184.220.29
whitelisted
codeload.github.com
  • 140.82.113.9
whitelisted

Threats

No threats detected
No debug info