Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21-04-2024 01:56
Static task
static1
Behavioral task
behavioral1
Sample
a162e0a322aaa6aa33b9f612d1c4821e53c1ecb6f1eacea332c6a00fd5ceec6f.exe
Resource
win10v2004-20240412-en
General
-
Target
a162e0a322aaa6aa33b9f612d1c4821e53c1ecb6f1eacea332c6a00fd5ceec6f.exe
-
Size
5.5MB
-
MD5
e659b6b749fca9d7e3f180d4ab7ab9e7
-
SHA1
0b1e82833c266eed2d2674360eb2a99c7abab798
-
SHA256
a162e0a322aaa6aa33b9f612d1c4821e53c1ecb6f1eacea332c6a00fd5ceec6f
-
SHA512
ccaff427db8a1c8914840b80da5d08fc3c31be6f88e09666d0245e41e8090ac4ebb46172b0ed1c6fa54ea86251874ca2345370c8ea9e3750ab32890a257ed38f
-
SSDEEP
98304:8tt1lBiCkK4x/kWVVjMZQf5bhDvnuTtCOPjqDb9teNYWcWQ38UfxE/wzEP7Svg:8tt1lBi/K4x/kuVjMs5bhDctCOru9teb
Malware Config
Extracted
meduza
109.107.181.83
Signatures
-
Detect ZGRat V1 35 IoCs
Processes:
resource yara_rule behavioral1/memory/3668-11-0x000002ADB12A0000-0x000002ADB1516000-memory.dmp family_zgrat_v1 behavioral1/memory/3668-12-0x000002ADB12A0000-0x000002ADB150F000-memory.dmp family_zgrat_v1 behavioral1/memory/3668-13-0x000002ADB12A0000-0x000002ADB150F000-memory.dmp family_zgrat_v1 behavioral1/memory/3668-15-0x000002ADB12A0000-0x000002ADB150F000-memory.dmp family_zgrat_v1 behavioral1/memory/3668-17-0x000002ADB12A0000-0x000002ADB150F000-memory.dmp family_zgrat_v1 behavioral1/memory/3668-19-0x000002ADB12A0000-0x000002ADB150F000-memory.dmp family_zgrat_v1 behavioral1/memory/3668-21-0x000002ADB12A0000-0x000002ADB150F000-memory.dmp family_zgrat_v1 behavioral1/memory/3668-25-0x000002ADB12A0000-0x000002ADB150F000-memory.dmp family_zgrat_v1 behavioral1/memory/3668-23-0x000002ADB12A0000-0x000002ADB150F000-memory.dmp family_zgrat_v1 behavioral1/memory/3668-29-0x000002ADB12A0000-0x000002ADB150F000-memory.dmp family_zgrat_v1 behavioral1/memory/3668-27-0x000002ADB12A0000-0x000002ADB150F000-memory.dmp family_zgrat_v1 behavioral1/memory/3668-31-0x000002ADB12A0000-0x000002ADB150F000-memory.dmp family_zgrat_v1 behavioral1/memory/3668-33-0x000002ADB12A0000-0x000002ADB150F000-memory.dmp family_zgrat_v1 behavioral1/memory/3668-35-0x000002ADB12A0000-0x000002ADB150F000-memory.dmp family_zgrat_v1 behavioral1/memory/3668-37-0x000002ADB12A0000-0x000002ADB150F000-memory.dmp family_zgrat_v1 behavioral1/memory/3668-39-0x000002ADB12A0000-0x000002ADB150F000-memory.dmp family_zgrat_v1 behavioral1/memory/3668-41-0x000002ADB12A0000-0x000002ADB150F000-memory.dmp family_zgrat_v1 behavioral1/memory/3668-43-0x000002ADB12A0000-0x000002ADB150F000-memory.dmp family_zgrat_v1 behavioral1/memory/3668-45-0x000002ADB12A0000-0x000002ADB150F000-memory.dmp family_zgrat_v1 behavioral1/memory/3668-47-0x000002ADB12A0000-0x000002ADB150F000-memory.dmp family_zgrat_v1 behavioral1/memory/3668-49-0x000002ADB12A0000-0x000002ADB150F000-memory.dmp family_zgrat_v1 behavioral1/memory/3668-51-0x000002ADB12A0000-0x000002ADB150F000-memory.dmp family_zgrat_v1 behavioral1/memory/3668-53-0x000002ADB12A0000-0x000002ADB150F000-memory.dmp family_zgrat_v1 behavioral1/memory/3668-55-0x000002ADB12A0000-0x000002ADB150F000-memory.dmp family_zgrat_v1 behavioral1/memory/3668-57-0x000002ADB12A0000-0x000002ADB150F000-memory.dmp family_zgrat_v1 behavioral1/memory/3668-59-0x000002ADB12A0000-0x000002ADB150F000-memory.dmp family_zgrat_v1 behavioral1/memory/3668-61-0x000002ADB12A0000-0x000002ADB150F000-memory.dmp family_zgrat_v1 behavioral1/memory/3668-63-0x000002ADB12A0000-0x000002ADB150F000-memory.dmp family_zgrat_v1 behavioral1/memory/3668-65-0x000002ADB12A0000-0x000002ADB150F000-memory.dmp family_zgrat_v1 behavioral1/memory/3668-67-0x000002ADB12A0000-0x000002ADB150F000-memory.dmp family_zgrat_v1 behavioral1/memory/3668-69-0x000002ADB12A0000-0x000002ADB150F000-memory.dmp family_zgrat_v1 behavioral1/memory/3668-71-0x000002ADB12A0000-0x000002ADB150F000-memory.dmp family_zgrat_v1 behavioral1/memory/3668-73-0x000002ADB12A0000-0x000002ADB150F000-memory.dmp family_zgrat_v1 behavioral1/memory/3668-75-0x000002ADB12A0000-0x000002ADB150F000-memory.dmp family_zgrat_v1 behavioral1/memory/3104-4923-0x0000000006600000-0x00000000068B8000-memory.dmp family_zgrat_v1 -
Meduza Stealer payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2448-4903-0x0000000140000000-0x00000001400DA000-memory.dmp family_meduza behavioral1/memory/2448-6703-0x0000000140000000-0x00000001400DA000-memory.dmp family_meduza -
Executes dropped EXE 2 IoCs
Processes:
responsibilitylead.exeresponsiibilitylead.exepid process 3668 responsibilitylead.exe 3104 responsiibilitylead.exe -
Accesses Microsoft Outlook profiles 1 TTPs 5 IoCs
Processes:
InstallUtil.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\SOFTWARE\Microsoft\Office\12.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\SOFTWARE\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
a162e0a322aaa6aa33b9f612d1c4821e53c1ecb6f1eacea332c6a00fd5ceec6f.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a162e0a322aaa6aa33b9f612d1c4821e53c1ecb6f1eacea332c6a00fd5ceec6f.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 141 api.ipify.org 143 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
responsibilitylead.exedescription pid process target process PID 3668 set thread context of 2448 3668 responsibilitylead.exe InstallUtil.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
InstallUtil.exepowershell.exepid process 2448 InstallUtil.exe 2448 InstallUtil.exe 1348 powershell.exe 1348 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
responsibilitylead.exepowershell.exeresponsiibilitylead.exedescription pid process Token: SeDebugPrivilege 3668 responsibilitylead.exe Token: SeDebugPrivilege 3668 responsibilitylead.exe Token: SeDebugPrivilege 1348 powershell.exe Token: SeDebugPrivilege 3104 responsiibilitylead.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
a162e0a322aaa6aa33b9f612d1c4821e53c1ecb6f1eacea332c6a00fd5ceec6f.exeresponsibilitylead.exedescription pid process target process PID 2408 wrote to memory of 3668 2408 a162e0a322aaa6aa33b9f612d1c4821e53c1ecb6f1eacea332c6a00fd5ceec6f.exe responsibilitylead.exe PID 2408 wrote to memory of 3668 2408 a162e0a322aaa6aa33b9f612d1c4821e53c1ecb6f1eacea332c6a00fd5ceec6f.exe responsibilitylead.exe PID 3668 wrote to memory of 2448 3668 responsibilitylead.exe InstallUtil.exe PID 3668 wrote to memory of 2448 3668 responsibilitylead.exe InstallUtil.exe PID 3668 wrote to memory of 2448 3668 responsibilitylead.exe InstallUtil.exe PID 3668 wrote to memory of 2448 3668 responsibilitylead.exe InstallUtil.exe PID 3668 wrote to memory of 2448 3668 responsibilitylead.exe InstallUtil.exe PID 3668 wrote to memory of 2448 3668 responsibilitylead.exe InstallUtil.exe PID 3668 wrote to memory of 2448 3668 responsibilitylead.exe InstallUtil.exe PID 3668 wrote to memory of 2448 3668 responsibilitylead.exe InstallUtil.exe PID 3668 wrote to memory of 2448 3668 responsibilitylead.exe InstallUtil.exe PID 3668 wrote to memory of 2448 3668 responsibilitylead.exe InstallUtil.exe PID 3668 wrote to memory of 2448 3668 responsibilitylead.exe InstallUtil.exe PID 3668 wrote to memory of 1348 3668 responsibilitylead.exe powershell.exe PID 3668 wrote to memory of 1348 3668 responsibilitylead.exe powershell.exe PID 2408 wrote to memory of 3104 2408 a162e0a322aaa6aa33b9f612d1c4821e53c1ecb6f1eacea332c6a00fd5ceec6f.exe responsiibilitylead.exe PID 2408 wrote to memory of 3104 2408 a162e0a322aaa6aa33b9f612d1c4821e53c1ecb6f1eacea332c6a00fd5ceec6f.exe responsiibilitylead.exe PID 2408 wrote to memory of 3104 2408 a162e0a322aaa6aa33b9f612d1c4821e53c1ecb6f1eacea332c6a00fd5ceec6f.exe responsiibilitylead.exe -
outlook_office_path 1 IoCs
Processes:
InstallUtil.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
outlook_win_path 1 IoCs
Processes:
InstallUtil.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a162e0a322aaa6aa33b9f612d1c4821e53c1ecb6f1eacea332c6a00fd5ceec6f.exe"C:\Users\Admin\AppData\Local\Temp\a162e0a322aaa6aa33b9f612d1c4821e53c1ecb6f1eacea332c6a00fd5ceec6f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\responsibilitylead.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\responsibilitylead.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"3⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_office_path
- outlook_win_path
PID:2448
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" Start-Sleep -Seconds 5; Remove-Item -Path 'C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\responsibilitylead.exe' -Force3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1348
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\responsiibilitylead.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\responsiibilitylead.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5a325585d782691d4f530403be9ccb56a
SHA1f6c2e81481053b1e868b59d0fe4c1ebfa69b6f66
SHA256ae3dea35b32555d0106dcaf376a10732dc311992ac9f02e215299720a8fa001e
SHA5123efe5e2d32b3b2daccefbad8f2f46def1fb96730726dc4ff6688c5a8a7d039054db83bfb38bb387e50f4d567c1e9b4150772943a43a9e9b6aad1996234dd1a72
-
Filesize
2.9MB
MD5e8c8c64d998f7c9f126c17f652c0f923
SHA183400b545c7d726dedbf3d9d589abde3134e25c0
SHA256753c941c37db0e6f3000f7ed281052342a4fd239087741a292026ecef0567065
SHA5127364a29cd29eef92ded400a7f54914958f03aec521826d59efe95e924b0c1502265418c7082bb0cbd049c617a9c01eb8f5d2f7be4336e5fbd397d7184562c751
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82