Analysis

  • max time kernel
    156s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-04-2024 01:16

General

  • Target

    39409db2a70039e2cc325529debbb9179981287e4e9a259c1ff3b45c1ca9e0f4.exe

  • Size

    14.5MB

  • MD5

    6d704657924328cb2dd07aef0bdb8777

  • SHA1

    b61098798c23791490e459899b3e52948e85b857

  • SHA256

    39409db2a70039e2cc325529debbb9179981287e4e9a259c1ff3b45c1ca9e0f4

  • SHA512

    4eb13f851f99a9105ff8386ea0c74b056a10b111c9393ebe4a93ac92c9fa16a24a641e954951b8cbf54d7bf9af2deee605e845b2d954584019eeba95d2b6d407

  • SSDEEP

    393216:DnZ4GTlYjEYCz35SfXCJdzbSJpnYrkVy/+YrzT43DG9UlpC:d4GyjJaJB/U9MkV8Dn43D0UlpC

Malware Config

Extracted

Family

meduza

C2

109.107.181.83

Signatures

  • Detect ZGRat V1 35 IoCs
  • Meduza

    Meduza is a crypto wallet and info stealer written in C++.

  • Meduza Stealer payload 1 IoCs
  • PureLog Stealer

    PureLog Stealer is an infostealer written in C#.

  • PureLog Stealer payload 1 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\39409db2a70039e2cc325529debbb9179981287e4e9a259c1ff3b45c1ca9e0f4.exe
    "C:\Users\Admin\AppData\Local\Temp\39409db2a70039e2cc325529debbb9179981287e4e9a259c1ff3b45c1ca9e0f4.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4232
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\responsibilitylead.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\responsibilitylead.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4064
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:1092
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\responsiibilitylead.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\responsiibilitylead.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3464
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3816 --field-trial-handle=2248,i,10247514684337323751,15511974759131734137,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:4492

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\responsibilitylead.exe

      Filesize

      6.6MB

      MD5

      e43b76667963ad1cdf1f1603a1a67b79

      SHA1

      a091aad8999eb8c9b833091044b6d7a0a89e4a4e

      SHA256

      cf3102636a070178cf575bc0e870fda7aa32d94dd6000d46de7205d064b0bd40

      SHA512

      d14c1e47759b176bff29bd2b50ff6abec4714cebc94b3408cb0ee4cecafa290212aac9ca3a5849a1bc4efbea50b9a50fe5d59d465b3245ebca34457a57a1abf1

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\responsiibilitylead.exe

      Filesize

      7.9MB

      MD5

      767fd4c24f2997c227aa977a453aeb34

      SHA1

      26b581bb0e595d5ef03408f07a2499eb8f500f9e

      SHA256

      c5e5f095446ed812431560727d42dc89fbca1a4bf776fef36f44be0825e577c8

      SHA512

      1a5eb0d4e1fba3454e8a8396f54acd64f416b137cfdcc9ce6057b680157940b1e53d2088a8fda91e2ce310bd31c6b52bf036649583578750222ccbe32618339f

    • memory/1092-4903-0x0000000140000000-0x00000001400DA000-memory.dmp

      Filesize

      872KB

    • memory/3464-4914-0x0000000074E40000-0x00000000755F0000-memory.dmp

      Filesize

      7.7MB

    • memory/3464-4915-0x00000000003C0000-0x0000000000BB0000-memory.dmp

      Filesize

      7.9MB

    • memory/3464-4916-0x0000000005540000-0x0000000005550000-memory.dmp

      Filesize

      64KB

    • memory/3464-4920-0x0000000006DA0000-0x0000000006E32000-memory.dmp

      Filesize

      584KB

    • memory/3464-4919-0x00000000072B0000-0x0000000007854000-memory.dmp

      Filesize

      5.6MB

    • memory/3464-4918-0x0000000006A40000-0x0000000006CF8000-memory.dmp

      Filesize

      2.7MB

    • memory/3464-4917-0x0000000005650000-0x0000000005908000-memory.dmp

      Filesize

      2.7MB

    • memory/4064-43-0x0000021833420000-0x0000021833690000-memory.dmp

      Filesize

      2.4MB

    • memory/4064-55-0x0000021833420000-0x0000021833690000-memory.dmp

      Filesize

      2.4MB

    • memory/4064-13-0x0000021833420000-0x0000021833690000-memory.dmp

      Filesize

      2.4MB

    • memory/4064-15-0x0000021833420000-0x0000021833690000-memory.dmp

      Filesize

      2.4MB

    • memory/4064-17-0x0000021833420000-0x0000021833690000-memory.dmp

      Filesize

      2.4MB

    • memory/4064-19-0x0000021833420000-0x0000021833690000-memory.dmp

      Filesize

      2.4MB

    • memory/4064-21-0x0000021833420000-0x0000021833690000-memory.dmp

      Filesize

      2.4MB

    • memory/4064-25-0x0000021833420000-0x0000021833690000-memory.dmp

      Filesize

      2.4MB

    • memory/4064-27-0x0000021833420000-0x0000021833690000-memory.dmp

      Filesize

      2.4MB

    • memory/4064-29-0x0000021833420000-0x0000021833690000-memory.dmp

      Filesize

      2.4MB

    • memory/4064-31-0x0000021833420000-0x0000021833690000-memory.dmp

      Filesize

      2.4MB

    • memory/4064-23-0x0000021833420000-0x0000021833690000-memory.dmp

      Filesize

      2.4MB

    • memory/4064-33-0x0000021833420000-0x0000021833690000-memory.dmp

      Filesize

      2.4MB

    • memory/4064-35-0x0000021833420000-0x0000021833690000-memory.dmp

      Filesize

      2.4MB

    • memory/4064-39-0x0000021833420000-0x0000021833690000-memory.dmp

      Filesize

      2.4MB

    • memory/4064-41-0x0000021833420000-0x0000021833690000-memory.dmp

      Filesize

      2.4MB

    • memory/4064-11-0x0000021833420000-0x0000021833696000-memory.dmp

      Filesize

      2.5MB

    • memory/4064-37-0x0000021833420000-0x0000021833690000-memory.dmp

      Filesize

      2.4MB

    • memory/4064-45-0x0000021833420000-0x0000021833690000-memory.dmp

      Filesize

      2.4MB

    • memory/4064-47-0x0000021833420000-0x0000021833690000-memory.dmp

      Filesize

      2.4MB

    • memory/4064-49-0x0000021833420000-0x0000021833690000-memory.dmp

      Filesize

      2.4MB

    • memory/4064-51-0x0000021833420000-0x0000021833690000-memory.dmp

      Filesize

      2.4MB

    • memory/4064-53-0x0000021833420000-0x0000021833690000-memory.dmp

      Filesize

      2.4MB

    • memory/4064-12-0x0000021833420000-0x0000021833690000-memory.dmp

      Filesize

      2.4MB

    • memory/4064-57-0x0000021833420000-0x0000021833690000-memory.dmp

      Filesize

      2.4MB

    • memory/4064-59-0x0000021833420000-0x0000021833690000-memory.dmp

      Filesize

      2.4MB

    • memory/4064-61-0x0000021833420000-0x0000021833690000-memory.dmp

      Filesize

      2.4MB

    • memory/4064-63-0x0000021833420000-0x0000021833690000-memory.dmp

      Filesize

      2.4MB

    • memory/4064-65-0x0000021833420000-0x0000021833690000-memory.dmp

      Filesize

      2.4MB

    • memory/4064-67-0x0000021833420000-0x0000021833690000-memory.dmp

      Filesize

      2.4MB

    • memory/4064-69-0x0000021833420000-0x0000021833690000-memory.dmp

      Filesize

      2.4MB

    • memory/4064-71-0x0000021833420000-0x0000021833690000-memory.dmp

      Filesize

      2.4MB

    • memory/4064-73-0x0000021833420000-0x0000021833690000-memory.dmp

      Filesize

      2.4MB

    • memory/4064-75-0x0000021833420000-0x0000021833690000-memory.dmp

      Filesize

      2.4MB

    • memory/4064-1395-0x00007FF9D52C0000-0x00007FF9D5D81000-memory.dmp

      Filesize

      10.8MB

    • memory/4064-1813-0x0000021819150000-0x0000021819160000-memory.dmp

      Filesize

      64KB

    • memory/4064-4894-0x0000021819110000-0x0000021819111000-memory.dmp

      Filesize

      4KB

    • memory/4064-10-0x0000021819150000-0x0000021819160000-memory.dmp

      Filesize

      64KB

    • memory/4064-9-0x00007FF9D52C0000-0x00007FF9D5D81000-memory.dmp

      Filesize

      10.8MB

    • memory/4064-8-0x00000218331A0000-0x0000021833414000-memory.dmp

      Filesize

      2.5MB

    • memory/4064-7-0x00000218186B0000-0x0000021818D46000-memory.dmp

      Filesize

      6.6MB

    • memory/4064-4895-0x0000021833790000-0x0000021833842000-memory.dmp

      Filesize

      712KB

    • memory/4064-4896-0x0000021833840000-0x000002183388C000-memory.dmp

      Filesize

      304KB

    • memory/4064-4898-0x0000021833A90000-0x0000021833AE4000-memory.dmp

      Filesize

      336KB

    • memory/4064-4904-0x00007FF9D52C0000-0x00007FF9D5D81000-memory.dmp

      Filesize

      10.8MB