Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
26-08-2024 16:01
Static task
static1
Behavioral task
behavioral1
Sample
4b16b9168f582448d16e99701ac2350175a369004fe52367bb0fdd4fbf423efb.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
4b16b9168f582448d16e99701ac2350175a369004fe52367bb0fdd4fbf423efb.exe
Resource
win11-20240802-en
General
-
Target
4b16b9168f582448d16e99701ac2350175a369004fe52367bb0fdd4fbf423efb.exe
-
Size
1.1MB
-
MD5
edcf54af80b2e95213811c8ddf962fdb
-
SHA1
bc4c5cc5abf7b1eeca77c22063f84a155b77c6e7
-
SHA256
4b16b9168f582448d16e99701ac2350175a369004fe52367bb0fdd4fbf423efb
-
SHA512
4672ee1f72d71b3e2b4498b3e888671c1e8293e2f6e214195e0188b66b9bb50619e7f37669191e53aa54b646e5ed424c6c3aa792d76cfc65735e7ddb08779cef
-
SSDEEP
24576:N+SV2awrjvJecHcMozsYfB84DZcmdAjM736leiUa1SIj9:cu2zrTfctewcwCEhDa1Sc
Malware Config
Signatures
-
Meduza Stealer payload 4 IoCs
resource yara_rule behavioral2/memory/4656-2-0x00000000025B0000-0x000000000279F000-memory.dmp family_meduza behavioral2/memory/4656-3-0x0000000000400000-0x00000000005FC000-memory.dmp family_meduza behavioral2/memory/4656-10-0x0000000000400000-0x00000000005FC000-memory.dmp family_meduza behavioral2/memory/4656-11-0x00000000025B0000-0x000000000279F000-memory.dmp family_meduza -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 13 api.ipify.org 23 api.ipify.org -
Program crash 13 IoCs
pid pid_target Process procid_target 4320 4656 WerFault.exe 79 3724 4656 WerFault.exe 79 1104 4656 WerFault.exe 79 112 4656 WerFault.exe 79 928 4656 WerFault.exe 79 2292 4656 WerFault.exe 79 4668 4656 WerFault.exe 79 4776 4656 WerFault.exe 79 3208 4656 WerFault.exe 79 2752 4656 WerFault.exe 79 5068 4656 WerFault.exe 79 2692 4656 WerFault.exe 79 3660 4656 WerFault.exe 79 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4b16b9168f582448d16e99701ac2350175a369004fe52367bb0fdd4fbf423efb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b16b9168f582448d16e99701ac2350175a369004fe52367bb0fdd4fbf423efb.exe"C:\Users\Admin\AppData\Local\Temp\4b16b9168f582448d16e99701ac2350175a369004fe52367bb0fdd4fbf423efb.exe"1⤵
- System Location Discovery: System Language Discovery
PID:4656 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4656 -s 8602⤵
- Program crash
PID:4320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4656 -s 8922⤵
- Program crash
PID:3724
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4656 -s 9202⤵
- Program crash
PID:1104
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4656 -s 9042⤵
- Program crash
PID:112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4656 -s 8762⤵
- Program crash
PID:928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4656 -s 10682⤵
- Program crash
PID:2292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4656 -s 16082⤵
- Program crash
PID:4668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4656 -s 16922⤵
- Program crash
PID:4776
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4656 -s 19082⤵
- Program crash
PID:3208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4656 -s 17082⤵
- Program crash
PID:2752
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4656 -s 17722⤵
- Program crash
PID:5068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4656 -s 17922⤵
- Program crash
PID:2692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4656 -s 18762⤵
- Program crash
PID:3660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4656 -ip 46561⤵PID:4284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4656 -ip 46561⤵PID:1460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4656 -ip 46561⤵PID:3576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4656 -ip 46561⤵PID:4436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4656 -ip 46561⤵PID:464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4656 -ip 46561⤵PID:3292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4656 -ip 46561⤵PID:960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 352 -p 4656 -ip 46561⤵PID:2600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 352 -p 4656 -ip 46561⤵PID:1944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4656 -ip 46561⤵PID:1592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4656 -ip 46561⤵PID:1728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4656 -ip 46561⤵PID:3824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4656 -ip 46561⤵PID:2092