Analysis

  • max time kernel
    151s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-04-2024 16:03

General

  • Target

    6d704657924328cb2dd07aef0bdb8777.exe

  • Size

    14.5MB

  • MD5

    6d704657924328cb2dd07aef0bdb8777

  • SHA1

    b61098798c23791490e459899b3e52948e85b857

  • SHA256

    39409db2a70039e2cc325529debbb9179981287e4e9a259c1ff3b45c1ca9e0f4

  • SHA512

    4eb13f851f99a9105ff8386ea0c74b056a10b111c9393ebe4a93ac92c9fa16a24a641e954951b8cbf54d7bf9af2deee605e845b2d954584019eeba95d2b6d407

  • SSDEEP

    393216:DnZ4GTlYjEYCz35SfXCJdzbSJpnYrkVy/+YrzT43DG9UlpC:d4GyjJaJB/U9MkV8Dn43D0UlpC

Malware Config

Extracted

Family

meduza

C2

109.107.181.83

Signatures

  • Detect ZGRat V1 35 IoCs
  • Meduza

    Meduza is a crypto wallet and info stealer written in C++.

  • Meduza Stealer payload 2 IoCs
  • PureLog Stealer

    PureLog Stealer is an infostealer written in C#.

  • PureLog Stealer payload 2 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Executes dropped EXE 2 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6d704657924328cb2dd07aef0bdb8777.exe
    "C:\Users\Admin\AppData\Local\Temp\6d704657924328cb2dd07aef0bdb8777.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4532
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\responsibilitylead.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\responsibilitylead.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:992
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"
        3⤵
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • outlook_office_path
        • outlook_win_path
        PID:2908
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\responsiibilitylead.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\responsiibilitylead.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:560
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4056 --field-trial-handle=2496,i,15897292497548307209,13920214570023230813,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:4012

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\responsibilitylead.exe

      Filesize

      6.6MB

      MD5

      e43b76667963ad1cdf1f1603a1a67b79

      SHA1

      a091aad8999eb8c9b833091044b6d7a0a89e4a4e

      SHA256

      cf3102636a070178cf575bc0e870fda7aa32d94dd6000d46de7205d064b0bd40

      SHA512

      d14c1e47759b176bff29bd2b50ff6abec4714cebc94b3408cb0ee4cecafa290212aac9ca3a5849a1bc4efbea50b9a50fe5d59d465b3245ebca34457a57a1abf1

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\responsiibilitylead.exe

      Filesize

      7.9MB

      MD5

      767fd4c24f2997c227aa977a453aeb34

      SHA1

      26b581bb0e595d5ef03408f07a2499eb8f500f9e

      SHA256

      c5e5f095446ed812431560727d42dc89fbca1a4bf776fef36f44be0825e577c8

      SHA512

      1a5eb0d4e1fba3454e8a8396f54acd64f416b137cfdcc9ce6057b680157940b1e53d2088a8fda91e2ce310bd31c6b52bf036649583578750222ccbe32618339f

    • memory/560-4908-0x00000000005E0000-0x0000000000DD0000-memory.dmp

      Filesize

      7.9MB

    • memory/560-4915-0x0000000075320000-0x0000000075AD0000-memory.dmp

      Filesize

      7.7MB

    • memory/560-4916-0x00000000056F0000-0x0000000005700000-memory.dmp

      Filesize

      64KB

    • memory/560-4917-0x0000000005800000-0x0000000005AB8000-memory.dmp

      Filesize

      2.7MB

    • memory/560-6319-0x0000000075320000-0x0000000075AD0000-memory.dmp

      Filesize

      7.7MB

    • memory/560-4920-0x0000000008210000-0x00000000082A2000-memory.dmp

      Filesize

      584KB

    • memory/560-4919-0x0000000008720000-0x0000000008CC4000-memory.dmp

      Filesize

      5.6MB

    • memory/560-4918-0x0000000007EB0000-0x0000000008168000-memory.dmp

      Filesize

      2.7MB

    • memory/992-45-0x00000148A1940000-0x00000148A1BB0000-memory.dmp

      Filesize

      2.4MB

    • memory/992-55-0x00000148A1940000-0x00000148A1BB0000-memory.dmp

      Filesize

      2.4MB

    • memory/992-13-0x00000148A1940000-0x00000148A1BB0000-memory.dmp

      Filesize

      2.4MB

    • memory/992-15-0x00000148A1940000-0x00000148A1BB0000-memory.dmp

      Filesize

      2.4MB

    • memory/992-17-0x00000148A1940000-0x00000148A1BB0000-memory.dmp

      Filesize

      2.4MB

    • memory/992-19-0x00000148A1940000-0x00000148A1BB0000-memory.dmp

      Filesize

      2.4MB

    • memory/992-21-0x00000148A1940000-0x00000148A1BB0000-memory.dmp

      Filesize

      2.4MB

    • memory/992-23-0x00000148A1940000-0x00000148A1BB0000-memory.dmp

      Filesize

      2.4MB

    • memory/992-25-0x00000148A1940000-0x00000148A1BB0000-memory.dmp

      Filesize

      2.4MB

    • memory/992-27-0x00000148A1940000-0x00000148A1BB0000-memory.dmp

      Filesize

      2.4MB

    • memory/992-29-0x00000148A1940000-0x00000148A1BB0000-memory.dmp

      Filesize

      2.4MB

    • memory/992-31-0x00000148A1940000-0x00000148A1BB0000-memory.dmp

      Filesize

      2.4MB

    • memory/992-33-0x00000148A1940000-0x00000148A1BB0000-memory.dmp

      Filesize

      2.4MB

    • memory/992-35-0x00000148A1940000-0x00000148A1BB0000-memory.dmp

      Filesize

      2.4MB

    • memory/992-37-0x00000148A1940000-0x00000148A1BB0000-memory.dmp

      Filesize

      2.4MB

    • memory/992-39-0x00000148A1940000-0x00000148A1BB0000-memory.dmp

      Filesize

      2.4MB

    • memory/992-41-0x00000148A1940000-0x00000148A1BB0000-memory.dmp

      Filesize

      2.4MB

    • memory/992-43-0x00000148A1940000-0x00000148A1BB0000-memory.dmp

      Filesize

      2.4MB

    • memory/992-11-0x00000148A1940000-0x00000148A1BB6000-memory.dmp

      Filesize

      2.5MB

    • memory/992-47-0x00000148A1940000-0x00000148A1BB0000-memory.dmp

      Filesize

      2.4MB

    • memory/992-49-0x00000148A1940000-0x00000148A1BB0000-memory.dmp

      Filesize

      2.4MB

    • memory/992-51-0x00000148A1940000-0x00000148A1BB0000-memory.dmp

      Filesize

      2.4MB

    • memory/992-53-0x00000148A1940000-0x00000148A1BB0000-memory.dmp

      Filesize

      2.4MB

    • memory/992-12-0x00000148A1940000-0x00000148A1BB0000-memory.dmp

      Filesize

      2.4MB

    • memory/992-57-0x00000148A1940000-0x00000148A1BB0000-memory.dmp

      Filesize

      2.4MB

    • memory/992-59-0x00000148A1940000-0x00000148A1BB0000-memory.dmp

      Filesize

      2.4MB

    • memory/992-61-0x00000148A1940000-0x00000148A1BB0000-memory.dmp

      Filesize

      2.4MB

    • memory/992-63-0x00000148A1940000-0x00000148A1BB0000-memory.dmp

      Filesize

      2.4MB

    • memory/992-65-0x00000148A1940000-0x00000148A1BB0000-memory.dmp

      Filesize

      2.4MB

    • memory/992-67-0x00000148A1940000-0x00000148A1BB0000-memory.dmp

      Filesize

      2.4MB

    • memory/992-69-0x00000148A1940000-0x00000148A1BB0000-memory.dmp

      Filesize

      2.4MB

    • memory/992-71-0x00000148A1940000-0x00000148A1BB0000-memory.dmp

      Filesize

      2.4MB

    • memory/992-73-0x00000148A1940000-0x00000148A1BB0000-memory.dmp

      Filesize

      2.4MB

    • memory/992-75-0x00000148A1940000-0x00000148A1BB0000-memory.dmp

      Filesize

      2.4MB

    • memory/992-1709-0x00007FFF70A60000-0x00007FFF71521000-memory.dmp

      Filesize

      10.8MB

    • memory/992-2152-0x0000014888FA0000-0x0000014888FB0000-memory.dmp

      Filesize

      64KB

    • memory/992-4894-0x0000014888E30000-0x0000014888E31000-memory.dmp

      Filesize

      4KB

    • memory/992-10-0x00000148A16C0000-0x00000148A1934000-memory.dmp

      Filesize

      2.5MB

    • memory/992-9-0x0000014888FA0000-0x0000014888FB0000-memory.dmp

      Filesize

      64KB

    • memory/992-8-0x00007FFF70A60000-0x00007FFF71521000-memory.dmp

      Filesize

      10.8MB

    • memory/992-4895-0x0000014888EF0000-0x0000014888FA2000-memory.dmp

      Filesize

      712KB

    • memory/992-4896-0x00000148A1CB0000-0x00000148A1CFC000-memory.dmp

      Filesize

      304KB

    • memory/992-4898-0x00000148A1F00000-0x00000148A1F54000-memory.dmp

      Filesize

      336KB

    • memory/992-4904-0x00007FFF70A60000-0x00007FFF71521000-memory.dmp

      Filesize

      10.8MB

    • memory/992-7-0x0000014886B20000-0x00000148871B6000-memory.dmp

      Filesize

      6.6MB

    • memory/2908-5294-0x0000000140000000-0x00000001400DA000-memory.dmp

      Filesize

      872KB

    • memory/2908-4903-0x0000000140000000-0x00000001400DA000-memory.dmp

      Filesize

      872KB