Analysis
-
max time kernel
117s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08-04-2024 18:47
Static task
static1
Behavioral task
behavioral1
Sample
pclient.exe
Resource
win10v2004-20240226-en
General
-
Target
pclient.exe
-
Size
14.5MB
-
MD5
6d704657924328cb2dd07aef0bdb8777
-
SHA1
b61098798c23791490e459899b3e52948e85b857
-
SHA256
39409db2a70039e2cc325529debbb9179981287e4e9a259c1ff3b45c1ca9e0f4
-
SHA512
4eb13f851f99a9105ff8386ea0c74b056a10b111c9393ebe4a93ac92c9fa16a24a641e954951b8cbf54d7bf9af2deee605e845b2d954584019eeba95d2b6d407
-
SSDEEP
393216:DnZ4GTlYjEYCz35SfXCJdzbSJpnYrkVy/+YrzT43DG9UlpC:d4GyjJaJB/U9MkV8Dn43D0UlpC
Malware Config
Extracted
meduza
109.107.181.83
Signatures
-
Detect ZGRat V1 35 IoCs
resource yara_rule behavioral1/memory/2492-11-0x000001D2429F0000-0x000001D242C66000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-12-0x000001D2429F0000-0x000001D242C60000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-13-0x000001D2429F0000-0x000001D242C60000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-15-0x000001D2429F0000-0x000001D242C60000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-17-0x000001D2429F0000-0x000001D242C60000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-19-0x000001D2429F0000-0x000001D242C60000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-21-0x000001D2429F0000-0x000001D242C60000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-23-0x000001D2429F0000-0x000001D242C60000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-25-0x000001D2429F0000-0x000001D242C60000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-27-0x000001D2429F0000-0x000001D242C60000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-29-0x000001D2429F0000-0x000001D242C60000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-31-0x000001D2429F0000-0x000001D242C60000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-33-0x000001D2429F0000-0x000001D242C60000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-35-0x000001D2429F0000-0x000001D242C60000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-37-0x000001D2429F0000-0x000001D242C60000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-39-0x000001D2429F0000-0x000001D242C60000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-41-0x000001D2429F0000-0x000001D242C60000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-43-0x000001D2429F0000-0x000001D242C60000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-45-0x000001D2429F0000-0x000001D242C60000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-47-0x000001D2429F0000-0x000001D242C60000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-49-0x000001D2429F0000-0x000001D242C60000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-51-0x000001D2429F0000-0x000001D242C60000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-53-0x000001D2429F0000-0x000001D242C60000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-55-0x000001D2429F0000-0x000001D242C60000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-57-0x000001D2429F0000-0x000001D242C60000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-59-0x000001D2429F0000-0x000001D242C60000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-61-0x000001D2429F0000-0x000001D242C60000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-63-0x000001D2429F0000-0x000001D242C60000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-65-0x000001D2429F0000-0x000001D242C60000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-67-0x000001D2429F0000-0x000001D242C60000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-69-0x000001D2429F0000-0x000001D242C60000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-71-0x000001D2429F0000-0x000001D242C60000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-73-0x000001D2429F0000-0x000001D242C60000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-75-0x000001D2429F0000-0x000001D242C60000-memory.dmp family_zgrat_v1 behavioral1/memory/264-4964-0x0000000007E10000-0x00000000080C8000-memory.dmp family_zgrat_v1 -
Meduza Stealer payload 2 IoCs
resource yara_rule behavioral1/memory/3184-4925-0x0000000140000000-0x00000001400DA000-memory.dmp family_meduza behavioral1/memory/3184-5436-0x0000000140000000-0x00000001400DA000-memory.dmp family_meduza -
PureLog Stealer
PureLog Stealer is an infostealer written in C#.
-
PureLog Stealer payload 2 IoCs
resource yara_rule behavioral1/files/0x000800000002322f-5.dat family_purelog_stealer behavioral1/memory/2492-7-0x000001D227C50000-0x000001D2282E6000-memory.dmp family_purelog_stealer -
Executes dropped EXE 3 IoCs
pid Process 2492 responsibilitylead.exe 1884 responsibilitylead.exe 264 responsiibilitylead.exe -
Accesses Microsoft Outlook profiles 1 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\SOFTWARE\Microsoft\Office\12.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\SOFTWARE\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" pclient.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" pclient.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 53 api.ipify.org 52 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2492 set thread context of 3184 2492 responsibilitylead.exe 108 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 3184 InstallUtil.exe 3184 InstallUtil.exe 2204 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2492 responsibilitylead.exe Token: SeDebugPrivilege 2204 taskmgr.exe Token: SeSystemProfilePrivilege 2204 taskmgr.exe Token: SeCreateGlobalPrivilege 2204 taskmgr.exe Token: SeDebugPrivilege 2492 responsibilitylead.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe -
Suspicious use of SendNotifyMessage 33 IoCs
pid Process 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe 2204 taskmgr.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2880 wrote to memory of 2492 2880 pclient.exe 86 PID 2880 wrote to memory of 2492 2880 pclient.exe 86 PID 1520 wrote to memory of 1884 1520 pclient.exe 107 PID 1520 wrote to memory of 1884 1520 pclient.exe 107 PID 2492 wrote to memory of 3184 2492 responsibilitylead.exe 108 PID 2492 wrote to memory of 3184 2492 responsibilitylead.exe 108 PID 2492 wrote to memory of 3184 2492 responsibilitylead.exe 108 PID 2492 wrote to memory of 3184 2492 responsibilitylead.exe 108 PID 2492 wrote to memory of 3184 2492 responsibilitylead.exe 108 PID 2492 wrote to memory of 3184 2492 responsibilitylead.exe 108 PID 2492 wrote to memory of 3184 2492 responsibilitylead.exe 108 PID 2492 wrote to memory of 3184 2492 responsibilitylead.exe 108 PID 2492 wrote to memory of 3184 2492 responsibilitylead.exe 108 PID 2492 wrote to memory of 3184 2492 responsibilitylead.exe 108 PID 2492 wrote to memory of 3184 2492 responsibilitylead.exe 108 PID 2880 wrote to memory of 264 2880 pclient.exe 109 PID 2880 wrote to memory of 264 2880 pclient.exe 109 PID 2880 wrote to memory of 264 2880 pclient.exe 109 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\pclient.exe"C:\Users\Admin\AppData\Local\Temp\pclient.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\responsibilitylead.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\responsibilitylead.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"3⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_office_path
- outlook_win_path
PID:3184
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\responsiibilitylead.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\responsiibilitylead.exe2⤵
- Executes dropped EXE
PID:264
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2204
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:500
-
C:\Users\Admin\AppData\Local\Temp\pclient.exe"C:\Users\Admin\AppData\Local\Temp\pclient.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\responsibilitylead.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\responsibilitylead.exe2⤵
- Executes dropped EXE
PID:1884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.6MB
MD5e43b76667963ad1cdf1f1603a1a67b79
SHA1a091aad8999eb8c9b833091044b6d7a0a89e4a4e
SHA256cf3102636a070178cf575bc0e870fda7aa32d94dd6000d46de7205d064b0bd40
SHA512d14c1e47759b176bff29bd2b50ff6abec4714cebc94b3408cb0ee4cecafa290212aac9ca3a5849a1bc4efbea50b9a50fe5d59d465b3245ebca34457a57a1abf1
-
Filesize
7.9MB
MD5767fd4c24f2997c227aa977a453aeb34
SHA126b581bb0e595d5ef03408f07a2499eb8f500f9e
SHA256c5e5f095446ed812431560727d42dc89fbca1a4bf776fef36f44be0825e577c8
SHA5121a5eb0d4e1fba3454e8a8396f54acd64f416b137cfdcc9ce6057b680157940b1e53d2088a8fda91e2ce310bd31c6b52bf036649583578750222ccbe32618339f