Analysis

  • max time kernel
    124s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-04-2024 01:28

General

  • Target

    39409db2a70039e2cc325529debbb9179981287e4e9a259c1ff3b45c1ca9e0f4.exe

  • Size

    14.5MB

  • MD5

    6d704657924328cb2dd07aef0bdb8777

  • SHA1

    b61098798c23791490e459899b3e52948e85b857

  • SHA256

    39409db2a70039e2cc325529debbb9179981287e4e9a259c1ff3b45c1ca9e0f4

  • SHA512

    4eb13f851f99a9105ff8386ea0c74b056a10b111c9393ebe4a93ac92c9fa16a24a641e954951b8cbf54d7bf9af2deee605e845b2d954584019eeba95d2b6d407

  • SSDEEP

    393216:DnZ4GTlYjEYCz35SfXCJdzbSJpnYrkVy/+YrzT43DG9UlpC:d4GyjJaJB/U9MkV8Dn43D0UlpC

Malware Config

Extracted

Family

meduza

C2

109.107.181.83

Signatures

  • Detect ZGRat V1 35 IoCs
  • Meduza

    Meduza is a crypto wallet and info stealer written in C++.

  • Meduza Stealer payload 3 IoCs
  • PureLog Stealer

    PureLog Stealer is an infostealer written in C#.

  • PureLog Stealer payload 2 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Executes dropped EXE 2 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\39409db2a70039e2cc325529debbb9179981287e4e9a259c1ff3b45c1ca9e0f4.exe
    "C:\Users\Admin\AppData\Local\Temp\39409db2a70039e2cc325529debbb9179981287e4e9a259c1ff3b45c1ca9e0f4.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3476
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\responsibilitylead.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\responsibilitylead.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3628
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"
        3⤵
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • outlook_office_path
        • outlook_win_path
        PID:4120
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\responsiibilitylead.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\responsiibilitylead.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2180

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\responsibilitylead.exe

    Filesize

    6.6MB

    MD5

    e43b76667963ad1cdf1f1603a1a67b79

    SHA1

    a091aad8999eb8c9b833091044b6d7a0a89e4a4e

    SHA256

    cf3102636a070178cf575bc0e870fda7aa32d94dd6000d46de7205d064b0bd40

    SHA512

    d14c1e47759b176bff29bd2b50ff6abec4714cebc94b3408cb0ee4cecafa290212aac9ca3a5849a1bc4efbea50b9a50fe5d59d465b3245ebca34457a57a1abf1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\responsiibilitylead.exe

    Filesize

    7.9MB

    MD5

    767fd4c24f2997c227aa977a453aeb34

    SHA1

    26b581bb0e595d5ef03408f07a2499eb8f500f9e

    SHA256

    c5e5f095446ed812431560727d42dc89fbca1a4bf776fef36f44be0825e577c8

    SHA512

    1a5eb0d4e1fba3454e8a8396f54acd64f416b137cfdcc9ce6057b680157940b1e53d2088a8fda91e2ce310bd31c6b52bf036649583578750222ccbe32618339f

  • memory/2180-4908-0x0000000074A60000-0x0000000075210000-memory.dmp

    Filesize

    7.7MB

  • memory/2180-4909-0x0000000000790000-0x0000000000F80000-memory.dmp

    Filesize

    7.9MB

  • memory/2180-4910-0x00000000059F0000-0x0000000005A00000-memory.dmp

    Filesize

    64KB

  • memory/2180-4911-0x0000000005A00000-0x0000000005CB8000-memory.dmp

    Filesize

    2.7MB

  • memory/2180-9807-0x0000000008F40000-0x0000000008FA6000-memory.dmp

    Filesize

    408KB

  • memory/2180-9806-0x00000000087D0000-0x00000000088C4000-memory.dmp

    Filesize

    976KB

  • memory/2180-9805-0x0000000006D40000-0x0000000006D41000-memory.dmp

    Filesize

    4KB

  • memory/2180-7779-0x00000000059F0000-0x0000000005A00000-memory.dmp

    Filesize

    64KB

  • memory/2180-7477-0x0000000074A60000-0x0000000075210000-memory.dmp

    Filesize

    7.7MB

  • memory/2180-4920-0x0000000008410000-0x00000000084A2000-memory.dmp

    Filesize

    584KB

  • memory/2180-4919-0x0000000008920000-0x0000000008EC4000-memory.dmp

    Filesize

    5.6MB

  • memory/2180-4915-0x00000000080B0000-0x0000000008368000-memory.dmp

    Filesize

    2.7MB

  • memory/3628-49-0x00000298F1170000-0x00000298F13E0000-memory.dmp

    Filesize

    2.4MB

  • memory/3628-65-0x00000298F1170000-0x00000298F13E0000-memory.dmp

    Filesize

    2.4MB

  • memory/3628-21-0x00000298F1170000-0x00000298F13E0000-memory.dmp

    Filesize

    2.4MB

  • memory/3628-23-0x00000298F1170000-0x00000298F13E0000-memory.dmp

    Filesize

    2.4MB

  • memory/3628-25-0x00000298F1170000-0x00000298F13E0000-memory.dmp

    Filesize

    2.4MB

  • memory/3628-27-0x00000298F1170000-0x00000298F13E0000-memory.dmp

    Filesize

    2.4MB

  • memory/3628-29-0x00000298F1170000-0x00000298F13E0000-memory.dmp

    Filesize

    2.4MB

  • memory/3628-31-0x00000298F1170000-0x00000298F13E0000-memory.dmp

    Filesize

    2.4MB

  • memory/3628-33-0x00000298F1170000-0x00000298F13E0000-memory.dmp

    Filesize

    2.4MB

  • memory/3628-35-0x00000298F1170000-0x00000298F13E0000-memory.dmp

    Filesize

    2.4MB

  • memory/3628-37-0x00000298F1170000-0x00000298F13E0000-memory.dmp

    Filesize

    2.4MB

  • memory/3628-39-0x00000298F1170000-0x00000298F13E0000-memory.dmp

    Filesize

    2.4MB

  • memory/3628-41-0x00000298F1170000-0x00000298F13E0000-memory.dmp

    Filesize

    2.4MB

  • memory/3628-43-0x00000298F1170000-0x00000298F13E0000-memory.dmp

    Filesize

    2.4MB

  • memory/3628-45-0x00000298F1170000-0x00000298F13E0000-memory.dmp

    Filesize

    2.4MB

  • memory/3628-47-0x00000298F1170000-0x00000298F13E0000-memory.dmp

    Filesize

    2.4MB

  • memory/3628-17-0x00000298F1170000-0x00000298F13E0000-memory.dmp

    Filesize

    2.4MB

  • memory/3628-51-0x00000298F1170000-0x00000298F13E0000-memory.dmp

    Filesize

    2.4MB

  • memory/3628-53-0x00000298F1170000-0x00000298F13E0000-memory.dmp

    Filesize

    2.4MB

  • memory/3628-55-0x00000298F1170000-0x00000298F13E0000-memory.dmp

    Filesize

    2.4MB

  • memory/3628-57-0x00000298F1170000-0x00000298F13E0000-memory.dmp

    Filesize

    2.4MB

  • memory/3628-59-0x00000298F1170000-0x00000298F13E0000-memory.dmp

    Filesize

    2.4MB

  • memory/3628-61-0x00000298F1170000-0x00000298F13E0000-memory.dmp

    Filesize

    2.4MB

  • memory/3628-19-0x00000298F1170000-0x00000298F13E0000-memory.dmp

    Filesize

    2.4MB

  • memory/3628-63-0x00000298F1170000-0x00000298F13E0000-memory.dmp

    Filesize

    2.4MB

  • memory/3628-69-0x00000298F1170000-0x00000298F13E0000-memory.dmp

    Filesize

    2.4MB

  • memory/3628-67-0x00000298F1170000-0x00000298F13E0000-memory.dmp

    Filesize

    2.4MB

  • memory/3628-75-0x00000298F1170000-0x00000298F13E0000-memory.dmp

    Filesize

    2.4MB

  • memory/3628-73-0x00000298F1170000-0x00000298F13E0000-memory.dmp

    Filesize

    2.4MB

  • memory/3628-71-0x00000298F1170000-0x00000298F13E0000-memory.dmp

    Filesize

    2.4MB

  • memory/3628-2641-0x00007FFBF5130000-0x00007FFBF5BF1000-memory.dmp

    Filesize

    10.8MB

  • memory/3628-3306-0x00000298D6CA0000-0x00000298D6CB0000-memory.dmp

    Filesize

    64KB

  • memory/3628-4894-0x00000298D6C70000-0x00000298D6C71000-memory.dmp

    Filesize

    4KB

  • memory/3628-15-0x00000298F1170000-0x00000298F13E0000-memory.dmp

    Filesize

    2.4MB

  • memory/3628-13-0x00000298F1170000-0x00000298F13E0000-memory.dmp

    Filesize

    2.4MB

  • memory/3628-12-0x00000298F1170000-0x00000298F13E0000-memory.dmp

    Filesize

    2.4MB

  • memory/3628-4895-0x00000298D8740000-0x00000298D87F2000-memory.dmp

    Filesize

    712KB

  • memory/3628-4896-0x00000298F13E0000-0x00000298F142C000-memory.dmp

    Filesize

    304KB

  • memory/3628-4898-0x00000298F1630000-0x00000298F1684000-memory.dmp

    Filesize

    336KB

  • memory/3628-4903-0x00007FFBF5130000-0x00007FFBF5BF1000-memory.dmp

    Filesize

    10.8MB

  • memory/3628-7-0x00000298D6220000-0x00000298D68B6000-memory.dmp

    Filesize

    6.6MB

  • memory/3628-9-0x00000298D6CA0000-0x00000298D6CB0000-memory.dmp

    Filesize

    64KB

  • memory/3628-11-0x00000298F1170000-0x00000298F13E6000-memory.dmp

    Filesize

    2.5MB

  • memory/3628-8-0x00007FFBF5130000-0x00007FFBF5BF1000-memory.dmp

    Filesize

    10.8MB

  • memory/3628-10-0x00000298F0EF0000-0x00000298F1164000-memory.dmp

    Filesize

    2.5MB

  • memory/4120-7698-0x0000000140000000-0x00000001400DA000-memory.dmp

    Filesize

    872KB

  • memory/4120-7168-0x0000000140000000-0x00000001400DA000-memory.dmp

    Filesize

    872KB

  • memory/4120-4904-0x0000000140000000-0x00000001400DA000-memory.dmp

    Filesize

    872KB