Analysis
-
max time kernel
156s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09-04-2024 01:16
Static task
static1
Behavioral task
behavioral1
Sample
39409db2a70039e2cc325529debbb9179981287e4e9a259c1ff3b45c1ca9e0f4.exe
Resource
win10v2004-20240226-en
General
-
Target
39409db2a70039e2cc325529debbb9179981287e4e9a259c1ff3b45c1ca9e0f4.exe
-
Size
14.5MB
-
MD5
6d704657924328cb2dd07aef0bdb8777
-
SHA1
b61098798c23791490e459899b3e52948e85b857
-
SHA256
39409db2a70039e2cc325529debbb9179981287e4e9a259c1ff3b45c1ca9e0f4
-
SHA512
4eb13f851f99a9105ff8386ea0c74b056a10b111c9393ebe4a93ac92c9fa16a24a641e954951b8cbf54d7bf9af2deee605e845b2d954584019eeba95d2b6d407
-
SSDEEP
393216:DnZ4GTlYjEYCz35SfXCJdzbSJpnYrkVy/+YrzT43DG9UlpC:d4GyjJaJB/U9MkV8Dn43D0UlpC
Malware Config
Extracted
meduza
109.107.181.83
Signatures
-
Detect ZGRat V1 35 IoCs
resource yara_rule behavioral1/memory/4064-11-0x0000021833420000-0x0000021833696000-memory.dmp family_zgrat_v1 behavioral1/memory/4064-12-0x0000021833420000-0x0000021833690000-memory.dmp family_zgrat_v1 behavioral1/memory/4064-13-0x0000021833420000-0x0000021833690000-memory.dmp family_zgrat_v1 behavioral1/memory/4064-15-0x0000021833420000-0x0000021833690000-memory.dmp family_zgrat_v1 behavioral1/memory/4064-17-0x0000021833420000-0x0000021833690000-memory.dmp family_zgrat_v1 behavioral1/memory/4064-19-0x0000021833420000-0x0000021833690000-memory.dmp family_zgrat_v1 behavioral1/memory/4064-21-0x0000021833420000-0x0000021833690000-memory.dmp family_zgrat_v1 behavioral1/memory/4064-25-0x0000021833420000-0x0000021833690000-memory.dmp family_zgrat_v1 behavioral1/memory/4064-27-0x0000021833420000-0x0000021833690000-memory.dmp family_zgrat_v1 behavioral1/memory/4064-29-0x0000021833420000-0x0000021833690000-memory.dmp family_zgrat_v1 behavioral1/memory/4064-31-0x0000021833420000-0x0000021833690000-memory.dmp family_zgrat_v1 behavioral1/memory/4064-23-0x0000021833420000-0x0000021833690000-memory.dmp family_zgrat_v1 behavioral1/memory/4064-33-0x0000021833420000-0x0000021833690000-memory.dmp family_zgrat_v1 behavioral1/memory/4064-35-0x0000021833420000-0x0000021833690000-memory.dmp family_zgrat_v1 behavioral1/memory/4064-39-0x0000021833420000-0x0000021833690000-memory.dmp family_zgrat_v1 behavioral1/memory/4064-41-0x0000021833420000-0x0000021833690000-memory.dmp family_zgrat_v1 behavioral1/memory/4064-43-0x0000021833420000-0x0000021833690000-memory.dmp family_zgrat_v1 behavioral1/memory/4064-37-0x0000021833420000-0x0000021833690000-memory.dmp family_zgrat_v1 behavioral1/memory/4064-45-0x0000021833420000-0x0000021833690000-memory.dmp family_zgrat_v1 behavioral1/memory/4064-47-0x0000021833420000-0x0000021833690000-memory.dmp family_zgrat_v1 behavioral1/memory/4064-49-0x0000021833420000-0x0000021833690000-memory.dmp family_zgrat_v1 behavioral1/memory/4064-51-0x0000021833420000-0x0000021833690000-memory.dmp family_zgrat_v1 behavioral1/memory/4064-53-0x0000021833420000-0x0000021833690000-memory.dmp family_zgrat_v1 behavioral1/memory/4064-55-0x0000021833420000-0x0000021833690000-memory.dmp family_zgrat_v1 behavioral1/memory/4064-57-0x0000021833420000-0x0000021833690000-memory.dmp family_zgrat_v1 behavioral1/memory/4064-59-0x0000021833420000-0x0000021833690000-memory.dmp family_zgrat_v1 behavioral1/memory/4064-61-0x0000021833420000-0x0000021833690000-memory.dmp family_zgrat_v1 behavioral1/memory/4064-63-0x0000021833420000-0x0000021833690000-memory.dmp family_zgrat_v1 behavioral1/memory/4064-65-0x0000021833420000-0x0000021833690000-memory.dmp family_zgrat_v1 behavioral1/memory/4064-67-0x0000021833420000-0x0000021833690000-memory.dmp family_zgrat_v1 behavioral1/memory/4064-69-0x0000021833420000-0x0000021833690000-memory.dmp family_zgrat_v1 behavioral1/memory/4064-71-0x0000021833420000-0x0000021833690000-memory.dmp family_zgrat_v1 behavioral1/memory/4064-73-0x0000021833420000-0x0000021833690000-memory.dmp family_zgrat_v1 behavioral1/memory/4064-75-0x0000021833420000-0x0000021833690000-memory.dmp family_zgrat_v1 behavioral1/memory/3464-4918-0x0000000006A40000-0x0000000006CF8000-memory.dmp family_zgrat_v1 -
Meduza Stealer payload 1 IoCs
resource yara_rule behavioral1/memory/1092-4903-0x0000000140000000-0x00000001400DA000-memory.dmp family_meduza -
PureLog Stealer
PureLog Stealer is an infostealer written in C#.
-
PureLog Stealer payload 1 IoCs
resource yara_rule behavioral1/files/0x000800000002326f-6.dat family_purelog_stealer -
Executes dropped EXE 2 IoCs
pid Process 4064 responsibilitylead.exe 3464 responsiibilitylead.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 39409db2a70039e2cc325529debbb9179981287e4e9a259c1ff3b45c1ca9e0f4.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 51 api.ipify.org 52 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4064 set thread context of 1092 4064 responsibilitylead.exe 106 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1092 InstallUtil.exe 1092 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4064 responsibilitylead.exe Token: SeDebugPrivilege 4064 responsibilitylead.exe Token: SeDebugPrivilege 3464 responsiibilitylead.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4232 wrote to memory of 4064 4232 39409db2a70039e2cc325529debbb9179981287e4e9a259c1ff3b45c1ca9e0f4.exe 96 PID 4232 wrote to memory of 4064 4232 39409db2a70039e2cc325529debbb9179981287e4e9a259c1ff3b45c1ca9e0f4.exe 96 PID 4064 wrote to memory of 1092 4064 responsibilitylead.exe 106 PID 4064 wrote to memory of 1092 4064 responsibilitylead.exe 106 PID 4064 wrote to memory of 1092 4064 responsibilitylead.exe 106 PID 4064 wrote to memory of 1092 4064 responsibilitylead.exe 106 PID 4064 wrote to memory of 1092 4064 responsibilitylead.exe 106 PID 4064 wrote to memory of 1092 4064 responsibilitylead.exe 106 PID 4064 wrote to memory of 1092 4064 responsibilitylead.exe 106 PID 4064 wrote to memory of 1092 4064 responsibilitylead.exe 106 PID 4064 wrote to memory of 1092 4064 responsibilitylead.exe 106 PID 4064 wrote to memory of 1092 4064 responsibilitylead.exe 106 PID 4064 wrote to memory of 1092 4064 responsibilitylead.exe 106 PID 4232 wrote to memory of 3464 4232 39409db2a70039e2cc325529debbb9179981287e4e9a259c1ff3b45c1ca9e0f4.exe 107 PID 4232 wrote to memory of 3464 4232 39409db2a70039e2cc325529debbb9179981287e4e9a259c1ff3b45c1ca9e0f4.exe 107 PID 4232 wrote to memory of 3464 4232 39409db2a70039e2cc325529debbb9179981287e4e9a259c1ff3b45c1ca9e0f4.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\39409db2a70039e2cc325529debbb9179981287e4e9a259c1ff3b45c1ca9e0f4.exe"C:\Users\Admin\AppData\Local\Temp\39409db2a70039e2cc325529debbb9179981287e4e9a259c1ff3b45c1ca9e0f4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\responsibilitylead.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\responsibilitylead.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1092
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\responsiibilitylead.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\responsiibilitylead.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3816 --field-trial-handle=2248,i,10247514684337323751,15511974759131734137,262144 --variations-seed-version /prefetch:81⤵PID:4492
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.6MB
MD5e43b76667963ad1cdf1f1603a1a67b79
SHA1a091aad8999eb8c9b833091044b6d7a0a89e4a4e
SHA256cf3102636a070178cf575bc0e870fda7aa32d94dd6000d46de7205d064b0bd40
SHA512d14c1e47759b176bff29bd2b50ff6abec4714cebc94b3408cb0ee4cecafa290212aac9ca3a5849a1bc4efbea50b9a50fe5d59d465b3245ebca34457a57a1abf1
-
Filesize
7.9MB
MD5767fd4c24f2997c227aa977a453aeb34
SHA126b581bb0e595d5ef03408f07a2499eb8f500f9e
SHA256c5e5f095446ed812431560727d42dc89fbca1a4bf776fef36f44be0825e577c8
SHA5121a5eb0d4e1fba3454e8a8396f54acd64f416b137cfdcc9ce6057b680157940b1e53d2088a8fda91e2ce310bd31c6b52bf036649583578750222ccbe32618339f