Analysis
-
max time kernel
130s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
08-04-2024 15:45
Behavioral task
behavioral1
Sample
responsibilitylead.exe
Resource
win7-20240220-en
14 signatures
150 seconds
Behavioral task
behavioral2
Sample
responsibilitylead.exe
Resource
win10v2004-20240226-en
14 signatures
150 seconds
General
-
Target
responsibilitylead.exe
-
Size
6.6MB
-
MD5
e43b76667963ad1cdf1f1603a1a67b79
-
SHA1
a091aad8999eb8c9b833091044b6d7a0a89e4a4e
-
SHA256
cf3102636a070178cf575bc0e870fda7aa32d94dd6000d46de7205d064b0bd40
-
SHA512
d14c1e47759b176bff29bd2b50ff6abec4714cebc94b3408cb0ee4cecafa290212aac9ca3a5849a1bc4efbea50b9a50fe5d59d465b3245ebca34457a57a1abf1
-
SSDEEP
196608:SAERid74MOMmrcKlW17Lv3+btkw0NBIdA8gkt8sYg:SA8idEMmrHlW1fWJtFBv
Score
10/10
Malware Config
Extracted
Family
meduza
C2
109.107.181.83
Signatures
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral1/memory/2916-4-0x000000001CBE0000-0x000000001CE56000-memory.dmp family_zgrat_v1 behavioral1/memory/2916-5-0x000000001CBE0000-0x000000001CE50000-memory.dmp family_zgrat_v1 behavioral1/memory/2916-6-0x000000001CBE0000-0x000000001CE50000-memory.dmp family_zgrat_v1 behavioral1/memory/2916-8-0x000000001CBE0000-0x000000001CE50000-memory.dmp family_zgrat_v1 behavioral1/memory/2916-10-0x000000001CBE0000-0x000000001CE50000-memory.dmp family_zgrat_v1 behavioral1/memory/2916-12-0x000000001CBE0000-0x000000001CE50000-memory.dmp family_zgrat_v1 behavioral1/memory/2916-14-0x000000001CBE0000-0x000000001CE50000-memory.dmp family_zgrat_v1 behavioral1/memory/2916-16-0x000000001CBE0000-0x000000001CE50000-memory.dmp family_zgrat_v1 behavioral1/memory/2916-18-0x000000001CBE0000-0x000000001CE50000-memory.dmp family_zgrat_v1 behavioral1/memory/2916-20-0x000000001CBE0000-0x000000001CE50000-memory.dmp family_zgrat_v1 behavioral1/memory/2916-22-0x000000001CBE0000-0x000000001CE50000-memory.dmp family_zgrat_v1 behavioral1/memory/2916-24-0x000000001CBE0000-0x000000001CE50000-memory.dmp family_zgrat_v1 behavioral1/memory/2916-26-0x000000001CBE0000-0x000000001CE50000-memory.dmp family_zgrat_v1 behavioral1/memory/2916-28-0x000000001CBE0000-0x000000001CE50000-memory.dmp family_zgrat_v1 behavioral1/memory/2916-30-0x000000001CBE0000-0x000000001CE50000-memory.dmp family_zgrat_v1 behavioral1/memory/2916-32-0x000000001CBE0000-0x000000001CE50000-memory.dmp family_zgrat_v1 behavioral1/memory/2916-34-0x000000001CBE0000-0x000000001CE50000-memory.dmp family_zgrat_v1 behavioral1/memory/2916-36-0x000000001CBE0000-0x000000001CE50000-memory.dmp family_zgrat_v1 behavioral1/memory/2916-38-0x000000001CBE0000-0x000000001CE50000-memory.dmp family_zgrat_v1 behavioral1/memory/2916-40-0x000000001CBE0000-0x000000001CE50000-memory.dmp family_zgrat_v1 behavioral1/memory/2916-42-0x000000001CBE0000-0x000000001CE50000-memory.dmp family_zgrat_v1 behavioral1/memory/2916-44-0x000000001CBE0000-0x000000001CE50000-memory.dmp family_zgrat_v1 behavioral1/memory/2916-46-0x000000001CBE0000-0x000000001CE50000-memory.dmp family_zgrat_v1 behavioral1/memory/2916-48-0x000000001CBE0000-0x000000001CE50000-memory.dmp family_zgrat_v1 behavioral1/memory/2916-50-0x000000001CBE0000-0x000000001CE50000-memory.dmp family_zgrat_v1 behavioral1/memory/2916-52-0x000000001CBE0000-0x000000001CE50000-memory.dmp family_zgrat_v1 behavioral1/memory/2916-54-0x000000001CBE0000-0x000000001CE50000-memory.dmp family_zgrat_v1 behavioral1/memory/2916-56-0x000000001CBE0000-0x000000001CE50000-memory.dmp family_zgrat_v1 behavioral1/memory/2916-58-0x000000001CBE0000-0x000000001CE50000-memory.dmp family_zgrat_v1 behavioral1/memory/2916-60-0x000000001CBE0000-0x000000001CE50000-memory.dmp family_zgrat_v1 behavioral1/memory/2916-62-0x000000001CBE0000-0x000000001CE50000-memory.dmp family_zgrat_v1 behavioral1/memory/2916-64-0x000000001CBE0000-0x000000001CE50000-memory.dmp family_zgrat_v1 behavioral1/memory/2916-66-0x000000001CBE0000-0x000000001CE50000-memory.dmp family_zgrat_v1 behavioral1/memory/2916-68-0x000000001CBE0000-0x000000001CE50000-memory.dmp family_zgrat_v1 -
Meduza Stealer payload 3 IoCs
resource yara_rule behavioral1/memory/2736-4908-0x0000000140000000-0x00000001400DA000-memory.dmp family_meduza behavioral1/memory/2736-4924-0x0000000140000000-0x00000001400DA000-memory.dmp family_meduza behavioral1/memory/2736-4925-0x0000000140000000-0x00000001400DA000-memory.dmp family_meduza -
PureLog Stealer
PureLog Stealer is an infostealer written in C#.
-
PureLog Stealer payload 1 IoCs
resource yara_rule behavioral1/memory/2916-0-0x0000000001370000-0x0000000001A06000-memory.dmp family_purelog_stealer -
Accesses Microsoft Outlook profiles 1 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\SOFTWARE\Microsoft\Office\12.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\SOFTWARE\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2916 set thread context of 2736 2916 responsibilitylead.exe 30 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2736 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2916 responsibilitylead.exe Token: SeDebugPrivilege 2916 responsibilitylead.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2916 wrote to memory of 2736 2916 responsibilitylead.exe 30 PID 2916 wrote to memory of 2736 2916 responsibilitylead.exe 30 PID 2916 wrote to memory of 2736 2916 responsibilitylead.exe 30 PID 2916 wrote to memory of 2736 2916 responsibilitylead.exe 30 PID 2916 wrote to memory of 2736 2916 responsibilitylead.exe 30 PID 2916 wrote to memory of 2736 2916 responsibilitylead.exe 30 PID 2916 wrote to memory of 2736 2916 responsibilitylead.exe 30 PID 2916 wrote to memory of 2736 2916 responsibilitylead.exe 30 PID 2916 wrote to memory of 2736 2916 responsibilitylead.exe 30 PID 2916 wrote to memory of 2736 2916 responsibilitylead.exe 30 PID 2916 wrote to memory of 2736 2916 responsibilitylead.exe 30 PID 2916 wrote to memory of 2736 2916 responsibilitylead.exe 30 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\responsibilitylead.exe"C:\Users\Admin\AppData\Local\Temp\responsibilitylead.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_office_path
- outlook_win_path
PID:2736
-