Windows
Analysis Report
MEMZ-Clean.exe
Overview
General Information
Detection
Score: | 56 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
MEMZ-Clean.exe (PID: 8072 cmdline:
"C:\Users\ user\Deskt op\MEMZ-Cl ean.exe" MD5: DF027834A1DEAE36A1641F6554291A2F)
- cleanup
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Code function: | 0_2_008323F0 |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Code function: | 0_2_00831000 |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Window detected: |
Source: | Static PE information: |
Source: | Code function: | 0_2_0083187D |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior |
Source: | Last function: |
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior |
Source: | API call chain: | graph_0-252 |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 1 DLL Side-Loading | 2 Virtualization/Sandbox Evasion | 1 Input Capture | 2 Virtualization/Sandbox Evasion | Remote Services | 1 Input Capture | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | LSASS Memory | 1 Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 Obfuscated Files or Information | Security Account Manager | 1 System Information Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 1 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
60% | Virustotal | Browse | ||
61% | ReversingLabs | Win32.Trojan.Zmem | ||
100% | Avira | TR/Zmem.bksjp |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com | 84.201.221.38 | true | false | high | |
pki-goog.l.google.com | 192.178.49.195 | true | false | high | |
c.pki.goog | unknown | unknown | false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1671575 |
Start date and time: | 2025-04-23 02:04:52 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 19s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 6 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | MEMZ-Clean.exe |
Detection: | MAL |
Classification: | mal56.winEXE@1/0@1/0 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): MpCmdRun.exe, a udiodg.exe, WMIADAP.exe, SIHCl ient.exe, conhost.exe - Excluded IPs from analysis (wh
itelisted): 4.175.87.197, 150. 171.28.254 - Excluded domains from analysis
(whitelisted): c2a9c95e369881 c67228a6591cac2686.clo.footpri ntdns.com, ax-ring.msedge.net, slscr.update.microsoft.com, c tldl.windowsupdate.com.deliver y.microsoft.com, ctldl.windows update.com, wu-b-net.trafficma nager.net, fe3cr.delivery.mp.m icrosoft.com - Not all processes where analyz
ed, report is missing behavior information
Time | Type | Description |
---|---|---|
20:06:41 | API Interceptor |
File type: | |
Entropy (8bit): | 5.284064968257939 |
TrID: |
|
File name: | MEMZ-Clean.exe |
File size: | 15'360 bytes |
MD5: | df027834a1deae36a1641f6554291a2f |
SHA1: | d3c5b5712dc83d1c3c55496a7f4305936411d2fb |
SHA256: | ae0446c03013c95ee19e28feda0d4ee3d445ae5e8981cdb32cc77834c3afad85 |
SHA512: | f4c0685ecc2b4871cbea5fc0bd9615adb51fa018b1e55c6fba1b012fdc551b75d0a8086813deb007b9959f9aac890aa87c1aa390f708cf6582f0056ada736c7b |
SSDEEP: | 192:5SKETE4lwO9OALSnhOiMUrONpBfMgVy9DyhnGhnlIBfMTR9N7:tETE8F9OYEovf1QRIBEV9 |
TLSH: | B862855BFED76466EDA54D7024B2B63F8D257CA28C78CC0FE8804E576CD5CB6A012722 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..../.f...............%....."......k........0....@.................................7.....@... ............................ |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x40146b |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT |
Time Stamp: | 0x66F02F8D [Sun Sep 22 14:54:05 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | 45a290c211fb5cb4e33ea5c2443f4837 |
Instruction |
---|
push ebp |
mov ebp, esp |
push edi |
push esi |
push ebx |
sub esp, 0000010Ch |
call dword ptr [004061C0h] |
mov dword ptr [00405000h], 00000000h |
mov dword ptr [esp], 00000011h |
call dword ptr [004061D4h] |
push ecx |
lea edx, dword ptr [ebp-74h] |
mov dword ptr [esp+08h], edx |
mov dword ptr [esp+04h], 0000005Ch |
mov dword ptr [esp], eax |
call dword ptr [004061D0h] |
sub esp, 0Ch |
lea eax, dword ptr [ebp-58h] |
mov dword ptr [esp+34h], eax |
movzx eax, byte ptr [ebp-59h] |
mov dword ptr [esp+30h], eax |
movzx eax, byte ptr [ebp-5Ah] |
mov dword ptr [esp+2Ch], eax |
movzx eax, byte ptr [ebp-5Bh] |
mov dword ptr [esp+28h], eax |
movzx eax, byte ptr [ebp-5Ch] |
mov dword ptr [esp+24h], eax |
movzx eax, byte ptr [ebp-5Dh] |
mov dword ptr [esp+20h], eax |
movzx eax, byte ptr [ebp-5Eh] |
mov dword ptr [esp+1Ch], eax |
movzx eax, byte ptr [ebp-5Fh] |
mov dword ptr [esp+18h], eax |
movzx eax, byte ptr [ebp-60h] |
mov dword ptr [esp+14h], eax |
mov eax, dword ptr [ebp-64h] |
mov dword ptr [esp+10h], eax |
mov eax, dword ptr [ebp-68h] |
mov dword ptr [esp+0Ch], eax |
mov eax, dword ptr [ebp-6Ch] |
mov dword ptr [esp+08h], eax |
mov eax, dword ptr [ebp-70h] |
mov dword ptr [esp+04h], eax |
mov eax, dword ptr [ebp-74h] |
mov dword ptr [esp], eax |
call dword ptr [004061CCh] |
sub esp, 38h |
mov dword ptr [00405004h], eax |
mov dword ptr [ebp-000000A4h], 00000030h |
mov dword ptr [ebp+00000000h], 00000000h |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x6000 | 0x828 | .idata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x7000 | 0x204 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x61b4 | 0x114 | .idata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x14e0 | 0x1600 | 21002354ff5b0196d920bc907b390970 | False | 0.4850852272727273 | data | 5.558653981049518 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.data | 0x3000 | 0x2c0 | 0x400 | 013bc9a7122c0757a8e7fb0e2334779f | False | 0.25390625 | Windows Precompiled iNF, version 0.1, InfStyle 1, src URL, at 0 "\001",, LanguageID 0 | 2.0345544686707315 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rdata | 0x4000 | 0xf1c | 0x1000 | dd01f4b41f1321bab9a24984b6641f6d | False | 0.360107421875 | data | 4.8968855857643385 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.bss | 0x5000 | 0x10 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.idata | 0x6000 | 0x828 | 0xa00 | 930c7a1318929a1c90b2679ccd0f3615 | False | 0.36171875 | data | 4.127541473274507 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.reloc | 0x7000 | 0x204 | 0x400 | 8b1b8807fd12041e797f97f4d1085ee2 | False | 0.486328125 | data | 3.9348161289428107 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
DLL | Import |
---|---|
ADVAPI32.dll | CryptAcquireContextW, CryptGenRandom |
COMCTL32.DLL | InitCommonControls |
GDI32.dll | BitBlt, CreateFontW, GetObjectW, GetStockObject, SelectObject, StretchBlt, TextOutW |
KERNEL32.dll | CreateThread, ExitProcess, FormatMessageW, GetCurrentProcessId, GetCurrentThreadId, GetModuleHandleW, GlobalAlloc, GlobalFree, LocalAlloc, Sleep, lstrlenW |
SHELL32.dll | ShellExecuteA |
USER32.dll | AdjustWindowRect, BeginPaint, CallNextHookEx, CreateWindowExW, DefWindowProcW, DispatchMessageW, DrawIcon, EndPaint, EnumChildWindows, EnumWindows, GetCursorPos, GetDesktopWindow, GetKeyState, GetMessageW, GetSystemMetrics, GetWindowDC, GetWindowLongW, GetWindowRect, GetWindowThreadProcessId, IsDialogMessageW, LoadIconW, MessageBoxA, MessageBoxW, RedrawWindow, RegisterClassExW, SendInput, SendMessageTimeoutW, SendMessageW, SetCursorPos, SetWindowsHookExW, ShowWindow, TranslateMessage, UnhookWindowsHookEx, UpdateWindow |
WINMM.DLL | PlaySoundA, waveOutOpen, waveOutPause, waveOutPrepareHeader, waveOutReset, waveOutWrite |
Download Network PCAP: filtered – full
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Apr 23, 2025 02:05:45.620446920 CEST | 56040 | 53 | 192.168.2.5 | 1.1.1.1 |
Apr 23, 2025 02:05:45.760752916 CEST | 53 | 56040 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Apr 23, 2025 02:05:45.620446920 CEST | 192.168.2.5 | 1.1.1.1 | 0xde2d | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Apr 23, 2025 02:05:44.367940903 CEST | 1.1.1.1 | 192.168.2.5 | 0x8808 | No error (0) | 84.201.221.38 | A (IP address) | IN (0x0001) | false | ||
Apr 23, 2025 02:05:44.367940903 CEST | 1.1.1.1 | 192.168.2.5 | 0x8808 | No error (0) | 84.201.221.21 | A (IP address) | IN (0x0001) | false | ||
Apr 23, 2025 02:05:44.367940903 CEST | 1.1.1.1 | 192.168.2.5 | 0x8808 | No error (0) | 84.201.221.22 | A (IP address) | IN (0x0001) | false | ||
Apr 23, 2025 02:05:44.367940903 CEST | 1.1.1.1 | 192.168.2.5 | 0x8808 | No error (0) | 84.201.221.37 | A (IP address) | IN (0x0001) | false | ||
Apr 23, 2025 02:05:44.367940903 CEST | 1.1.1.1 | 192.168.2.5 | 0x8808 | No error (0) | 84.201.221.26 | A (IP address) | IN (0x0001) | false | ||
Apr 23, 2025 02:05:44.367940903 CEST | 1.1.1.1 | 192.168.2.5 | 0x8808 | No error (0) | 84.201.221.25 | A (IP address) | IN (0x0001) | false | ||
Apr 23, 2025 02:05:44.367940903 CEST | 1.1.1.1 | 192.168.2.5 | 0x8808 | No error (0) | 84.201.221.36 | A (IP address) | IN (0x0001) | false | ||
Apr 23, 2025 02:05:44.367940903 CEST | 1.1.1.1 | 192.168.2.5 | 0x8808 | No error (0) | 84.201.221.23 | A (IP address) | IN (0x0001) | false | ||
Apr 23, 2025 02:05:45.760752916 CEST | 1.1.1.1 | 192.168.2.5 | 0xde2d | No error (0) | pki-goog.l.google.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Apr 23, 2025 02:05:45.760752916 CEST | 1.1.1.1 | 192.168.2.5 | 0xde2d | No error (0) | 192.178.49.195 | A (IP address) | IN (0x0001) | false |
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 20:05:47 |
Start date: | 22/04/2025 |
Path: | C:\Users\user\Desktop\MEMZ-Clean.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x830000 |
File size: | 15'360 bytes |
MD5 hash: | DF027834A1DEAE36A1641F6554291A2F |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Execution Graph
Execution Coverage
Dynamic/Packed Code Coverage
Signature Coverage
Execution Coverage: | 36.3% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 10.9% |
Total number of Nodes: | 147 |
Total number of Limit Nodes: | 3 |
Graph
Callgraph
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0083146B Relevance: 49.2, APIs: 20, Strings: 8, Instructions: 229windowthreadregistryCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|