Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    26-08-2024 15:15

General

  • Target

    8ddf88965ab1fd9eadc5968e54519b6c9b41f726f285407a1af655c72fc119be.exe

  • Size

    2.0MB

  • MD5

    5b4fdb19963fce2e64fc0890df5346d4

  • SHA1

    2cc3d3e389537b5b3591d857050548e282e61000

  • SHA256

    8ddf88965ab1fd9eadc5968e54519b6c9b41f726f285407a1af655c72fc119be

  • SHA512

    f29bbee8917669cb806a68d51ff4101aa8852b05d430f15d5342dab39e496cf9f16f92df7860655189ec72529f68e57bd1cf9d5b6dde72914c9ff6f97f1bc308

  • SSDEEP

    49152:mTTFQGBE4R87o04gyxMkJZVRamAcHLx2ZfA+JqIfREQBw:mn6GO4UojgWJbX+A+b

Malware Config

Signatures

  • Meduza

    Meduza is a crypto wallet and info stealer written in C++.

  • Meduza Stealer payload 2 IoCs
  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ddf88965ab1fd9eadc5968e54519b6c9b41f726f285407a1af655c72fc119be.exe
    "C:\Users\Admin\AppData\Local\Temp\8ddf88965ab1fd9eadc5968e54519b6c9b41f726f285407a1af655c72fc119be.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1660
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /k move Terror Terror.bat & Terror.bat & exit
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4180
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:124
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "wrsa.exe opssvc.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:952
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1904
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "avastui.exe avgui.exe bdservicehost.exe ekrn.exe nswscsvc.exe sophoshealth.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:228
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 554184
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3312
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "CHARMSRULINGADIDASSECONDARY" Makes
        3⤵
        • System Location Discovery: System Language Discovery
        PID:256
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Dome + ..\Master + ..\Gene + ..\Monday + ..\Microwave + ..\Kitchen + ..\Family + ..\Deny + ..\Distribute + ..\Carriers + ..\Mails + ..\Personal + ..\Brands + ..\Artist + ..\Advert + ..\Edges + ..\Po + ..\Handling + ..\Loans + ..\Retailers Z
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1592
      • C:\Users\Admin\AppData\Local\Temp\554184\Proof.pif
        Proof.pif Z
        3⤵
        • Deletes itself
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:5084
        • C:\Users\Admin\AppData\Local\Temp\554184\Proof.pif
          C:\Users\Admin\AppData\Local\Temp\554184\Proof.pif
          4⤵
          • Executes dropped EXE
          • Accesses Microsoft Outlook profiles
          • Suspicious behavior: EnumeratesProcesses
          • outlook_office_path
          • outlook_win_path
          PID:5116
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1356

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\554184\Proof.pif

    Filesize

    1.0MB

    MD5

    c63860691927d62432750013b5a20f5f

    SHA1

    03678170aadf6bab2ac2b742f5ea2fd1b11feca3

    SHA256

    69d2f1718ea284829ddf8c1a0b39742ae59f2f21f152a664baa01940ef43e353

    SHA512

    3357cb6468c15a10d5e3f1912349d7af180f7bd4c83d7b0fd1a719a0422e90d52be34d9583c99abeccdb5337595b292a2aa025727895565f3a6432cab46148de

  • C:\Users\Admin\AppData\Local\Temp\554184\Z

    Filesize

    1.4MB

    MD5

    8638e6b92559a8ee2e530ce2a4be9318

    SHA1

    e3b77c3b91d00dc5d62d7b86b7727d89f7229bc5

    SHA256

    35f7b14e3b7b4d66fe3d1952798e73777188a1a85cb9f09704d9ccaaf78d8734

    SHA512

    bdf803b33a65151e81f349b9ccfc09cb2ca4fce7eba94c1e5d960e6a947fc15591ed53d30a0f19c7fe68775fd361235e17f5e38e82bf3a466085e95cc4a133bc

  • C:\Users\Admin\AppData\Local\Temp\Advert

    Filesize

    58KB

    MD5

    5d5658b0c2c21f8fbbe6e3d6481c5cfb

    SHA1

    efcbf14e5ef18ac17ea95ae82072efed54fb5561

    SHA256

    b03236b12fc048610dcf5a42f5793fd90a85f751f5426f043afae9bf660c92bf

    SHA512

    5abb11c433858d0632245d50438eb6cf0c5817974b2d6b333d73792cd1be4a93d0dde9c6db5655082d872307e0bf2ca44305d711ac2210378a2f6cc2ce93b175

  • C:\Users\Admin\AppData\Local\Temp\Artist

    Filesize

    61KB

    MD5

    956f7bc88f09b5203bf10fedc208bf22

    SHA1

    c65b512bbd7784be371e432a9c3f25f19f05823d

    SHA256

    9d4d32109b9c3cb87de8a6167f4f0be6357a2b5dcb36d3af294d92aa9b18af2a

    SHA512

    52feb957c0607093f8e1d405cdbe7d578f6d34441f30abe7ddd66d321f28928035cb644d49859e08f8abb5920d38c51c2ce75f6502a92c283211ed0abc6ca840

  • C:\Users\Admin\AppData\Local\Temp\Brands

    Filesize

    70KB

    MD5

    0ea4216a77f66e2810cc50b481aee91b

    SHA1

    653155247a83cafac283e0b8744ea7d8456533f8

    SHA256

    d5f81f90d26351d978b321215fceba656352f7825c1d66f8e154ca024957f379

    SHA512

    2782433bf54f4e2d680c418af92b8f2323788f9084ca9b71ca68497891a977b2371bca05578db3fbd786f6ed94e1e13a9249efd9cb3c18f09cce264fd4015ad6

  • C:\Users\Admin\AppData\Local\Temp\Carriers

    Filesize

    75KB

    MD5

    e026279c1a4274f29de25542df70b217

    SHA1

    caef48eb56c6c65b14054e9cdfe4855bda2c144c

    SHA256

    e50912c7445b5f12b6d01f547087a084532208e8291f040af0363e6068a47a79

    SHA512

    48f57bac9144707694d65f17a094662b141331814d9aa0ab03a14755114223537d41bb7f7a728a6794bdf03a6fc1029b1658f912bd71c9f5a65fdecd3fcfed88

  • C:\Users\Admin\AppData\Local\Temp\Childrens

    Filesize

    1.0MB

    MD5

    0a80c272fb3f7e5d71641f3e5c94a31b

    SHA1

    fc00fc33c4f2eb864d2ad48b83bb34e225ad6522

    SHA256

    8477011f3cf4a38c178616602c42ef70d2f5633b5846f79095290cc6b0210825

    SHA512

    19086a895f5be31eb7eeb8f8a35789da2deb104272fb07b95273c86a5f2429af2516221b05a6c5f3dbfd52e1547af563353f5b65ebf86e676fec16e6cdb27cd1

  • C:\Users\Admin\AppData\Local\Temp\Deny

    Filesize

    74KB

    MD5

    99d2a73714dce1a778cc36f8f0c93437

    SHA1

    e1921f2e7feea0be680617064ad9356eb0ef5041

    SHA256

    65d2695384c24bdc3180740bbe3316bf7ce5ff7cbd9e327c385ec0fd6bb775aa

    SHA512

    99db4001bf83372e9f7ffa6e8bc2356d4d5dfd495d79693ccfa62010136ffc0646dd3ca2c085f98650dd7a0893f02fef53bfb4bc557f1d322e4b3602972c9461

  • C:\Users\Admin\AppData\Local\Temp\Distribute

    Filesize

    91KB

    MD5

    6b6aaa26a423332345fefc8942ce7d8f

    SHA1

    335ff751f850dd76f2ece359072e6151aa45ae63

    SHA256

    e4e432ef8c1139060c3a67ff5328b106251e51b0d4973b19b8a98945d6e4fbfb

    SHA512

    1ec373fb8a174f2c3c9ee20176ba31b1893f7ebc2351b55ba694d0786a05f0bd75ed4aa2bf57fa83e0c4350b13b3bcab0307c84ff77c48784bcc8d8a50c91d53

  • C:\Users\Admin\AppData\Local\Temp\Dome

    Filesize

    71KB

    MD5

    2be0e1d531a37d1ec26494698eb0714c

    SHA1

    cee115540c3bca4120faf13e917fc2296cf2de32

    SHA256

    db1143de2eb34f125e382fe96fc098634f713cb5655946a0ea3e79037b409100

    SHA512

    72396bec85df54218402f69cf8f46d2afffa484f61fa7e208242d658ce5cc5710c16a08ea666749a705d67a8262c4750983a3180c50c9f5cdc0ff322cc8a5ba2

  • C:\Users\Admin\AppData\Local\Temp\Edges

    Filesize

    90KB

    MD5

    f178fe5a108c6303e9e964d9e9ad9471

    SHA1

    d735d2f111451a443358857cbed006c1b2fce1ac

    SHA256

    c2b5d9903c6145ab418053163bbfa7f01634134069fa7cc5f29add1b123f7d53

    SHA512

    a14e606f5ee4a6c5e2e61c01f818d0642004d7ce3b9cb3bdec0ba5febee5bc50738c55282eb06cfd8ab43b42b3a75fba871f3289c51c72e24d101c1ad206059b

  • C:\Users\Admin\AppData\Local\Temp\Family

    Filesize

    64KB

    MD5

    3c6aff12b82c00e727852f116de47575

    SHA1

    38b15db1c5c57fa439ecb280c71e3677e61d4273

    SHA256

    701bc0be23bb9ee3c1b3fb96673630381b1942654b6a8b425981a3cd179cddbf

    SHA512

    8886ed9018884e273b77c161d828adb3b50953bd3c8d5f91984cce7e24b6fd98ffd71d1688078785569af2425fee79959aaf53805a5c966018f2430b43691d5b

  • C:\Users\Admin\AppData\Local\Temp\Gene

    Filesize

    87KB

    MD5

    82aa338859bd02ea51a5fa3774f58f29

    SHA1

    2db9ef3b7480a484d6707220f417c4d033b57c6a

    SHA256

    8c4e574d5d63a452373de57ae2759de11977b18d0b9592282a96d2082ac4ae27

    SHA512

    6a9069d5689a69a9d37792a19162caa8c6fcade3458d148499e5f7150017e01305d70bbc710b1e3a511a12a61fdf15609b2497588328b9e4c73d2ea787688918

  • C:\Users\Admin\AppData\Local\Temp\Handling

    Filesize

    62KB

    MD5

    b7ea5425f57833eef75c690ea11f948a

    SHA1

    a4f6e614bbc3d016ef40336840bcc654d4679388

    SHA256

    dd177830a1f19431628a66cde9c0df210241206ad463e2c81be9b7461394b343

    SHA512

    0cf4648cd0f0ec0aaedde2610d302e18a8e9af1fbe8bf811197cf4c6feae19a2ed86e499397573b2f5cbdac9a6589e6da66992b30e8a75bf001afa354c303a81

  • C:\Users\Admin\AppData\Local\Temp\Kitchen

    Filesize

    75KB

    MD5

    d89129bc0703f6f9230ee6cca234505f

    SHA1

    e4a823354cd5cb5c553a405f3268053e33dee60b

    SHA256

    e3043f43b26478a3e2fa8afa2182302b320b3ac661169e042ad2d515dc8a867a

    SHA512

    f200c83cab5c30d1a646e55c08108451e2f4c7679329fcea1a8606233497c4e009c1dfbb94652da2bc2c3cad5b440aa4120df2a543f9f1c74480c129645b99c3

  • C:\Users\Admin\AppData\Local\Temp\Loans

    Filesize

    96KB

    MD5

    1462c6f0c06c0f2c1bcec9bbdb843b38

    SHA1

    0e13f5282067467273e03afe4c9a237a89d69e37

    SHA256

    7b7dd4abd3ab83707988b314cf7dad083d8f3b8e743a9f6c324fda53e719e0dd

    SHA512

    5c2a59dd9195462c037e7c1d3c3c5786f310896bfdecc667fe2f33d0a96791c9bb17b590a46dba9ec11348bfdac511d4ace06e7b6f9e3ab2e551068ac040412b

  • C:\Users\Admin\AppData\Local\Temp\Mails

    Filesize

    78KB

    MD5

    b5ca8b4c9b7661e44c2fb5a702c70b1b

    SHA1

    c36bc3f530436f7a8e4094bb64b7c687b7dcd28b

    SHA256

    d4d59a150678154d399daa53caebc3b6d266a332302f6ee06da12acfb3f93d39

    SHA512

    ba4567ca421831197d0e63feac988649aef40da720b8790ab8472feddb5092d6b36a56e3abcad613dca3166e1ab885d1a434dd4433cd748d5b683438ad465026

  • C:\Users\Admin\AppData\Local\Temp\Makes

    Filesize

    511B

    MD5

    b6466348bf7898587d4daa0e3fdc8619

    SHA1

    6da6ffd52d6c2b92618807e9649801969af10630

    SHA256

    0bb63f2f60ec619a63c044b3769db2c989e336e6b8e526e18daafbddca614d09

    SHA512

    39c849e85866839580727b1e585a83ac2fd46674b3900c7a15d9fe2dba1f313ee04b9f8eaafaba5311eee3d07e97722d2ce49b40af806ef6893a1ac51199336d

  • C:\Users\Admin\AppData\Local\Temp\Master

    Filesize

    59KB

    MD5

    e1e9de9fd3945c9e5d665e3bf26a11ef

    SHA1

    d46c50e85881fefd7a4b0ba0245fdf459121e696

    SHA256

    23ef794804f1690d9f6f241d59558ebf69ba13f2f490b98ec0dbd6aad7e4e602

    SHA512

    245cfccea0d9b6b5aa43f6abb86571b465d8fda143e2f11ed0921f9da1dd88cf036139455e0694c2db68ba31b8baa6e61bcf801be628a754455d53da289da2c6

  • C:\Users\Admin\AppData\Local\Temp\Microwave

    Filesize

    75KB

    MD5

    d5eeebad0f019267d2f09e70356d2dd7

    SHA1

    043d7a39118957282bbbb2848c3314105e0c58cd

    SHA256

    fda5c32afb513d9e0c21727257dc86c70e32c4aedfad0172c1265dade757ed95

    SHA512

    31201e1313dbce6b618f0209130282ac85fc8cf298de1f012e164cd8f1e1e6d59744463141d6d9199a2ada325132f349823d4ec86d5d39bf2cfad66b900833e0

  • C:\Users\Admin\AppData\Local\Temp\Monday

    Filesize

    57KB

    MD5

    cfeae124165924893b44d1a98082a867

    SHA1

    3060afbfee8ac04d182db0e684f4337f2e874218

    SHA256

    368de3c51502b83833adbda21ef6697dcf7fb47115570a7996d530d2550614c0

    SHA512

    2efd3f11033aa77e74dcb3c84a51f5c9bb4181111eedce7d590e91e77e18d12a8c9266e843afc96e45ae8ab9222a1b9c7a41d71f3a7970337ee48b47b7743678

  • C:\Users\Admin\AppData\Local\Temp\Personal

    Filesize

    55KB

    MD5

    f56db5591867954e7aa288d5c5095dfa

    SHA1

    4bd7f39d2611ed7b001ffea145de256ef43301c9

    SHA256

    fae3c73ce7915d9774c66348b169b097475f3eab9a62738c28f5a015b3e29fc4

    SHA512

    7dd06e868b7c24cfc6e273b3fe42bf349dd1da3066527b9eddf7938628c7c30d70a3d23062888b1315a2a831f5cf3aec05cde2054658ee837ce7daf0f4ee08a2

  • C:\Users\Admin\AppData\Local\Temp\Po

    Filesize

    61KB

    MD5

    7eecf87ac37c13e4516445fafaff256f

    SHA1

    79b0a108af2c5791c588d9f5334cf0d2eb8e0683

    SHA256

    1892fdf62eaa29f22bb3eb8bc62e2f3d19a5af13a6977c4914a9c97562557dde

    SHA512

    898f3a3c9a6a214359723839af8504b009f7a9fa65cd56f14d59b8bf4e34319134b49b5b65bda0d282adbb41f536c78b3403dc6ffae1d695bf7cbcf68c64a41a

  • C:\Users\Admin\AppData\Local\Temp\Retailers

    Filesize

    46KB

    MD5

    1f5e75b155de56b553f2f47f5e0e9834

    SHA1

    74af23460b9302d260a79bb7aae4fadd020c699c

    SHA256

    c7acd89ba567f3c15010e62f2aca2270e0c87c96d6c7fb3df0851259e4746a48

    SHA512

    1778f6bc56df273175d49c2fb5ebe0b0934b79720f452db5a34f9159056ff3ee3bf334f52f4a94f296791891fa488d7fe720605b8c22be9e406971ad99e6985b

  • C:\Users\Admin\AppData\Local\Temp\Terror

    Filesize

    21KB

    MD5

    16a0e2c5ebb6f94c3126876995119a37

    SHA1

    3d107045ad3804fc3cbbc8833d3b9e4e67406f8d

    SHA256

    e71d3080f7c4713443c8e5b7d47d3b4ce4e619b2a1c7117dda472d9dbeccfa4a

    SHA512

    2452a6db36e338690553fec7db38bcf49dcc7987777a73d6c0c8e99d464835dce4c583855c28e7174e38855a0158ba1d9e13f3c379c5cf92383ae2209d527cd1

  • memory/5116-54-0x000001FA0D5B0000-0x000001FA0D699000-memory.dmp

    Filesize

    932KB

  • memory/5116-55-0x000001FA0D5B0000-0x000001FA0D699000-memory.dmp

    Filesize

    932KB

  • memory/5116-57-0x000001FA0D5B0000-0x000001FA0D699000-memory.dmp

    Filesize

    932KB