Analysis
-
max time kernel
142s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-08-2024 16:01
Static task
static1
Behavioral task
behavioral1
Sample
4b16b9168f582448d16e99701ac2350175a369004fe52367bb0fdd4fbf423efb.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
4b16b9168f582448d16e99701ac2350175a369004fe52367bb0fdd4fbf423efb.exe
Resource
win11-20240802-en
General
-
Target
4b16b9168f582448d16e99701ac2350175a369004fe52367bb0fdd4fbf423efb.exe
-
Size
1.1MB
-
MD5
edcf54af80b2e95213811c8ddf962fdb
-
SHA1
bc4c5cc5abf7b1eeca77c22063f84a155b77c6e7
-
SHA256
4b16b9168f582448d16e99701ac2350175a369004fe52367bb0fdd4fbf423efb
-
SHA512
4672ee1f72d71b3e2b4498b3e888671c1e8293e2f6e214195e0188b66b9bb50619e7f37669191e53aa54b646e5ed424c6c3aa792d76cfc65735e7ddb08779cef
-
SSDEEP
24576:N+SV2awrjvJecHcMozsYfB84DZcmdAjM736leiUa1SIj9:cu2zrTfctewcwCEhDa1Sc
Malware Config
Signatures
-
Meduza Stealer payload 4 IoCs
resource yara_rule behavioral1/memory/3196-2-0x0000000002480000-0x000000000266F000-memory.dmp family_meduza behavioral1/memory/3196-3-0x0000000000400000-0x00000000005FC000-memory.dmp family_meduza behavioral1/memory/3196-10-0x0000000000400000-0x00000000005FC000-memory.dmp family_meduza behavioral1/memory/3196-11-0x0000000002480000-0x000000000266F000-memory.dmp family_meduza -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation 4b16b9168f582448d16e99701ac2350175a369004fe52367bb0fdd4fbf423efb.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 25 api.ipify.org 24 api.ipify.org -
Program crash 15 IoCs
pid pid_target Process procid_target 1544 3196 WerFault.exe 83 4620 3196 WerFault.exe 83 3060 3196 WerFault.exe 83 3880 3196 WerFault.exe 83 4072 3196 WerFault.exe 83 4332 3196 WerFault.exe 83 3200 3196 WerFault.exe 83 664 3196 WerFault.exe 83 3636 3196 WerFault.exe 83 3048 3196 WerFault.exe 83 2252 3196 WerFault.exe 83 3368 3196 WerFault.exe 83 4080 3196 WerFault.exe 83 4356 3196 WerFault.exe 83 3216 3196 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4b16b9168f582448d16e99701ac2350175a369004fe52367bb0fdd4fbf423efb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b16b9168f582448d16e99701ac2350175a369004fe52367bb0fdd4fbf423efb.exe"C:\Users\Admin\AppData\Local\Temp\4b16b9168f582448d16e99701ac2350175a369004fe52367bb0fdd4fbf423efb.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3196 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 8202⤵
- Program crash
PID:1544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 8522⤵
- Program crash
PID:4620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 8202⤵
- Program crash
PID:3060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 8842⤵
- Program crash
PID:3880
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 9642⤵
- Program crash
PID:4072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 10642⤵
- Program crash
PID:4332
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 14882⤵
- Program crash
PID:3200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 15922⤵
- Program crash
PID:664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 17762⤵
- Program crash
PID:3636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 18002⤵
- Program crash
PID:3048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 15402⤵
- Program crash
PID:2252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 15322⤵
- Program crash
PID:3368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 15962⤵
- Program crash
PID:4080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 15522⤵
- Program crash
PID:4356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 16002⤵
- Program crash
PID:3216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3196 -ip 31961⤵PID:1132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3196 -ip 31961⤵PID:3192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3196 -ip 31961⤵PID:2532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3196 -ip 31961⤵PID:1184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3196 -ip 31961⤵PID:964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 3196 -ip 31961⤵PID:1400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3196 -ip 31961⤵PID:4348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3196 -ip 31961⤵PID:3484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3196 -ip 31961⤵PID:4452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 3196 -ip 31961⤵PID:1880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 3196 -ip 31961⤵PID:2828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 3196 -ip 31961⤵PID:3040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 3196 -ip 31961⤵PID:2004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 3196 -ip 31961⤵PID:4712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3196 -ip 31961⤵PID:748
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1