Analysis
-
max time kernel
151s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08-04-2024 16:03
Static task
static1
Behavioral task
behavioral1
Sample
6d704657924328cb2dd07aef0bdb8777.exe
Resource
win10v2004-20240226-en
General
-
Target
6d704657924328cb2dd07aef0bdb8777.exe
-
Size
14.5MB
-
MD5
6d704657924328cb2dd07aef0bdb8777
-
SHA1
b61098798c23791490e459899b3e52948e85b857
-
SHA256
39409db2a70039e2cc325529debbb9179981287e4e9a259c1ff3b45c1ca9e0f4
-
SHA512
4eb13f851f99a9105ff8386ea0c74b056a10b111c9393ebe4a93ac92c9fa16a24a641e954951b8cbf54d7bf9af2deee605e845b2d954584019eeba95d2b6d407
-
SSDEEP
393216:DnZ4GTlYjEYCz35SfXCJdzbSJpnYrkVy/+YrzT43DG9UlpC:d4GyjJaJB/U9MkV8Dn43D0UlpC
Malware Config
Extracted
meduza
109.107.181.83
Signatures
-
Detect ZGRat V1 35 IoCs
resource yara_rule behavioral1/memory/992-11-0x00000148A1940000-0x00000148A1BB6000-memory.dmp family_zgrat_v1 behavioral1/memory/992-12-0x00000148A1940000-0x00000148A1BB0000-memory.dmp family_zgrat_v1 behavioral1/memory/992-13-0x00000148A1940000-0x00000148A1BB0000-memory.dmp family_zgrat_v1 behavioral1/memory/992-15-0x00000148A1940000-0x00000148A1BB0000-memory.dmp family_zgrat_v1 behavioral1/memory/992-17-0x00000148A1940000-0x00000148A1BB0000-memory.dmp family_zgrat_v1 behavioral1/memory/992-19-0x00000148A1940000-0x00000148A1BB0000-memory.dmp family_zgrat_v1 behavioral1/memory/992-21-0x00000148A1940000-0x00000148A1BB0000-memory.dmp family_zgrat_v1 behavioral1/memory/992-23-0x00000148A1940000-0x00000148A1BB0000-memory.dmp family_zgrat_v1 behavioral1/memory/992-25-0x00000148A1940000-0x00000148A1BB0000-memory.dmp family_zgrat_v1 behavioral1/memory/992-27-0x00000148A1940000-0x00000148A1BB0000-memory.dmp family_zgrat_v1 behavioral1/memory/992-29-0x00000148A1940000-0x00000148A1BB0000-memory.dmp family_zgrat_v1 behavioral1/memory/992-31-0x00000148A1940000-0x00000148A1BB0000-memory.dmp family_zgrat_v1 behavioral1/memory/992-33-0x00000148A1940000-0x00000148A1BB0000-memory.dmp family_zgrat_v1 behavioral1/memory/992-35-0x00000148A1940000-0x00000148A1BB0000-memory.dmp family_zgrat_v1 behavioral1/memory/992-37-0x00000148A1940000-0x00000148A1BB0000-memory.dmp family_zgrat_v1 behavioral1/memory/992-39-0x00000148A1940000-0x00000148A1BB0000-memory.dmp family_zgrat_v1 behavioral1/memory/992-41-0x00000148A1940000-0x00000148A1BB0000-memory.dmp family_zgrat_v1 behavioral1/memory/992-43-0x00000148A1940000-0x00000148A1BB0000-memory.dmp family_zgrat_v1 behavioral1/memory/992-45-0x00000148A1940000-0x00000148A1BB0000-memory.dmp family_zgrat_v1 behavioral1/memory/992-47-0x00000148A1940000-0x00000148A1BB0000-memory.dmp family_zgrat_v1 behavioral1/memory/992-49-0x00000148A1940000-0x00000148A1BB0000-memory.dmp family_zgrat_v1 behavioral1/memory/992-51-0x00000148A1940000-0x00000148A1BB0000-memory.dmp family_zgrat_v1 behavioral1/memory/992-53-0x00000148A1940000-0x00000148A1BB0000-memory.dmp family_zgrat_v1 behavioral1/memory/992-55-0x00000148A1940000-0x00000148A1BB0000-memory.dmp family_zgrat_v1 behavioral1/memory/992-57-0x00000148A1940000-0x00000148A1BB0000-memory.dmp family_zgrat_v1 behavioral1/memory/992-59-0x00000148A1940000-0x00000148A1BB0000-memory.dmp family_zgrat_v1 behavioral1/memory/992-61-0x00000148A1940000-0x00000148A1BB0000-memory.dmp family_zgrat_v1 behavioral1/memory/992-63-0x00000148A1940000-0x00000148A1BB0000-memory.dmp family_zgrat_v1 behavioral1/memory/992-65-0x00000148A1940000-0x00000148A1BB0000-memory.dmp family_zgrat_v1 behavioral1/memory/992-67-0x00000148A1940000-0x00000148A1BB0000-memory.dmp family_zgrat_v1 behavioral1/memory/992-69-0x00000148A1940000-0x00000148A1BB0000-memory.dmp family_zgrat_v1 behavioral1/memory/992-71-0x00000148A1940000-0x00000148A1BB0000-memory.dmp family_zgrat_v1 behavioral1/memory/992-73-0x00000148A1940000-0x00000148A1BB0000-memory.dmp family_zgrat_v1 behavioral1/memory/992-75-0x00000148A1940000-0x00000148A1BB0000-memory.dmp family_zgrat_v1 behavioral1/memory/560-4918-0x0000000007EB0000-0x0000000008168000-memory.dmp family_zgrat_v1 -
Meduza Stealer payload 2 IoCs
resource yara_rule behavioral1/memory/2908-4903-0x0000000140000000-0x00000001400DA000-memory.dmp family_meduza behavioral1/memory/2908-5294-0x0000000140000000-0x00000001400DA000-memory.dmp family_meduza -
PureLog Stealer
PureLog Stealer is an infostealer written in C#.
-
PureLog Stealer payload 2 IoCs
resource yara_rule behavioral1/files/0x000700000002331f-5.dat family_purelog_stealer behavioral1/memory/992-7-0x0000014886B20000-0x00000148871B6000-memory.dmp family_purelog_stealer -
Executes dropped EXE 2 IoCs
pid Process 992 responsibilitylead.exe 560 responsiibilitylead.exe -
Accesses Microsoft Outlook profiles 1 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Office\12.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6d704657924328cb2dd07aef0bdb8777.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 50 api.ipify.org 51 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 992 set thread context of 2908 992 responsibilitylead.exe 105 -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2908 InstallUtil.exe 2908 InstallUtil.exe 2908 InstallUtil.exe 2908 InstallUtil.exe 2908 InstallUtil.exe 2908 InstallUtil.exe 2908 InstallUtil.exe 2908 InstallUtil.exe 2908 InstallUtil.exe 2908 InstallUtil.exe 2908 InstallUtil.exe 2908 InstallUtil.exe 2908 InstallUtil.exe 2908 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 992 responsibilitylead.exe Token: SeDebugPrivilege 992 responsibilitylead.exe Token: SeDebugPrivilege 560 responsiibilitylead.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4532 wrote to memory of 992 4532 6d704657924328cb2dd07aef0bdb8777.exe 93 PID 4532 wrote to memory of 992 4532 6d704657924328cb2dd07aef0bdb8777.exe 93 PID 992 wrote to memory of 2908 992 responsibilitylead.exe 105 PID 992 wrote to memory of 2908 992 responsibilitylead.exe 105 PID 992 wrote to memory of 2908 992 responsibilitylead.exe 105 PID 992 wrote to memory of 2908 992 responsibilitylead.exe 105 PID 992 wrote to memory of 2908 992 responsibilitylead.exe 105 PID 992 wrote to memory of 2908 992 responsibilitylead.exe 105 PID 992 wrote to memory of 2908 992 responsibilitylead.exe 105 PID 992 wrote to memory of 2908 992 responsibilitylead.exe 105 PID 992 wrote to memory of 2908 992 responsibilitylead.exe 105 PID 992 wrote to memory of 2908 992 responsibilitylead.exe 105 PID 992 wrote to memory of 2908 992 responsibilitylead.exe 105 PID 4532 wrote to memory of 560 4532 6d704657924328cb2dd07aef0bdb8777.exe 106 PID 4532 wrote to memory of 560 4532 6d704657924328cb2dd07aef0bdb8777.exe 106 PID 4532 wrote to memory of 560 4532 6d704657924328cb2dd07aef0bdb8777.exe 106 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d704657924328cb2dd07aef0bdb8777.exe"C:\Users\Admin\AppData\Local\Temp\6d704657924328cb2dd07aef0bdb8777.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\responsibilitylead.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\responsibilitylead.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"3⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_office_path
- outlook_win_path
PID:2908
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\responsiibilitylead.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\responsiibilitylead.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4056 --field-trial-handle=2496,i,15897292497548307209,13920214570023230813,262144 --variations-seed-version /prefetch:81⤵PID:4012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.6MB
MD5e43b76667963ad1cdf1f1603a1a67b79
SHA1a091aad8999eb8c9b833091044b6d7a0a89e4a4e
SHA256cf3102636a070178cf575bc0e870fda7aa32d94dd6000d46de7205d064b0bd40
SHA512d14c1e47759b176bff29bd2b50ff6abec4714cebc94b3408cb0ee4cecafa290212aac9ca3a5849a1bc4efbea50b9a50fe5d59d465b3245ebca34457a57a1abf1
-
Filesize
7.9MB
MD5767fd4c24f2997c227aa977a453aeb34
SHA126b581bb0e595d5ef03408f07a2499eb8f500f9e
SHA256c5e5f095446ed812431560727d42dc89fbca1a4bf776fef36f44be0825e577c8
SHA5121a5eb0d4e1fba3454e8a8396f54acd64f416b137cfdcc9ce6057b680157940b1e53d2088a8fda91e2ce310bd31c6b52bf036649583578750222ccbe32618339f