Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05-04-2024 02:02
Static task
static1
Behavioral task
behavioral1
Sample
fb1454d4d93e03243d5b4529e65f0580a07e30fb2446fa59efe652eb253adb30.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
fb1454d4d93e03243d5b4529e65f0580a07e30fb2446fa59efe652eb253adb30.exe
Resource
win11-20240221-en
General
-
Target
fb1454d4d93e03243d5b4529e65f0580a07e30fb2446fa59efe652eb253adb30.exe
-
Size
4.1MB
-
MD5
08c1c75fa8aa4394b1718d8909c8d8d7
-
SHA1
8c1beb916c0610c398ae7d1eaf45954d6b40083a
-
SHA256
fb1454d4d93e03243d5b4529e65f0580a07e30fb2446fa59efe652eb253adb30
-
SHA512
1911e9fa332e0cce6995c64c1fe3b864d76da59b1fe007192d392abf42c94bfebdc6ea4fbe1ed45df6cd9d53beeac14e0c5ffe15189275b456796dadcaed016f
-
SSDEEP
49152:xXmM3+IVJiicn3HpKoQyvf7+OngFhpRelaJMuiGXMUjVqrn6BPVc:KdVjnaK8yZG+6Tc
Malware Config
Extracted
meduza
5.182.86.229
Signatures
-
Meduza Stealer payload 5 IoCs
resource yara_rule behavioral1/memory/116-0-0x0000000140000000-0x00000001400D3000-memory.dmp family_meduza behavioral1/memory/116-1-0x0000000140000000-0x00000001400D3000-memory.dmp family_meduza behavioral1/memory/116-2-0x0000000140000000-0x00000001400D3000-memory.dmp family_meduza behavioral1/memory/116-3-0x0000000140000000-0x00000001400D3000-memory.dmp family_meduza behavioral1/memory/116-10-0x0000000140000000-0x00000001400D3000-memory.dmp family_meduza -
Accesses Microsoft Outlook profiles 1 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Office\12.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 9 api.ipify.org 8 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2772 set thread context of 116 2772 fb1454d4d93e03243d5b4529e65f0580a07e30fb2446fa59efe652eb253adb30.exe 86 -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4924 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 116 explorer.exe 116 explorer.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2772 fb1454d4d93e03243d5b4529e65f0580a07e30fb2446fa59efe652eb253adb30.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2772 wrote to memory of 116 2772 fb1454d4d93e03243d5b4529e65f0580a07e30fb2446fa59efe652eb253adb30.exe 86 PID 2772 wrote to memory of 116 2772 fb1454d4d93e03243d5b4529e65f0580a07e30fb2446fa59efe652eb253adb30.exe 86 PID 2772 wrote to memory of 116 2772 fb1454d4d93e03243d5b4529e65f0580a07e30fb2446fa59efe652eb253adb30.exe 86 PID 2772 wrote to memory of 116 2772 fb1454d4d93e03243d5b4529e65f0580a07e30fb2446fa59efe652eb253adb30.exe 86 PID 2772 wrote to memory of 116 2772 fb1454d4d93e03243d5b4529e65f0580a07e30fb2446fa59efe652eb253adb30.exe 86 PID 2772 wrote to memory of 116 2772 fb1454d4d93e03243d5b4529e65f0580a07e30fb2446fa59efe652eb253adb30.exe 86 PID 2772 wrote to memory of 116 2772 fb1454d4d93e03243d5b4529e65f0580a07e30fb2446fa59efe652eb253adb30.exe 86 PID 2772 wrote to memory of 116 2772 fb1454d4d93e03243d5b4529e65f0580a07e30fb2446fa59efe652eb253adb30.exe 86 PID 2772 wrote to memory of 116 2772 fb1454d4d93e03243d5b4529e65f0580a07e30fb2446fa59efe652eb253adb30.exe 86 PID 2772 wrote to memory of 116 2772 fb1454d4d93e03243d5b4529e65f0580a07e30fb2446fa59efe652eb253adb30.exe 86 PID 2772 wrote to memory of 116 2772 fb1454d4d93e03243d5b4529e65f0580a07e30fb2446fa59efe652eb253adb30.exe 86 PID 116 wrote to memory of 3284 116 explorer.exe 97 PID 116 wrote to memory of 3284 116 explorer.exe 97 PID 3284 wrote to memory of 4924 3284 cmd.exe 99 PID 3284 wrote to memory of 4924 3284 cmd.exe 99 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb1454d4d93e03243d5b4529e65f0580a07e30fb2446fa59efe652eb253adb30.exe"C:\Users\Admin\AppData\Local\Temp\fb1454d4d93e03243d5b4529e65f0580a07e30fb2446fa59efe652eb253adb30.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:116 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Windows\explorer.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 30004⤵
- Runs ping.exe
PID:4924
-
-
-