Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
10/10/2024, 14:06
Static task
static1
Behavioral task
behavioral1
Sample
Oldsetup.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Oldsetup.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
Oldsetup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
Oldsetup.exe
Resource
win11-20241007-en
General
-
Target
Oldsetup.exe
-
Size
2.6MB
-
MD5
98e56fc6276f5ea11ed37de5b40116d3
-
SHA1
882fd2c385eeaffec3881b3262de638ff912f276
-
SHA256
9006378885c4a84699ad0f90dbe7579969e3a1b41f6fd334c4e440d30a15d063
-
SHA512
978c3f3e5e866db2cc59a3474a6b75291b3eba44d445887c2afd50218dce776a650822eb67118481e62411b02102c7e49a1dc99db507d4cca59d0253b5b1a19b
-
SSDEEP
49152:HZPf0tL9d77T+WScpPNBqB0+iZjS9fQzm4qU0Hy+GtGHkyMaRV/EfZ8yd:EVScpPN3OHmUQ
Malware Config
Extracted
meduza
79.137.202.152
-
anti_dbg
true
-
anti_vm
false
-
build_name
OurOld2
-
extensions
.txt;.doc;.docx;.pdf;.xls;.xlsx;.log;.db;.sqlite
-
grabber_max_size
1.048576e+06
-
port
15666
-
self_destruct
true
Signatures
-
Meduza Stealer payload 5 IoCs
resource yara_rule behavioral1/memory/2384-8-0x0000000140000000-0x000000014013B000-memory.dmp family_meduza behavioral1/memory/2384-10-0x0000000140000000-0x000000014013B000-memory.dmp family_meduza behavioral1/memory/2384-9-0x0000000140000000-0x000000014013B000-memory.dmp family_meduza behavioral1/memory/2384-6-0x0000000140000000-0x000000014013B000-memory.dmp family_meduza behavioral1/memory/2384-20-0x0000000140000000-0x000000014013B000-memory.dmp family_meduza -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\Control Panel\International\Geo\Nation Oldsetup.exe -
Executes dropped EXE 1 IoCs
pid Process 2384 Oldsetup.exe -
Loads dropped DLL 1 IoCs
pid Process 4112 Oldsetup.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\SOFTWARE\Microsoft\Office\12.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Oldsetup.exe Key opened \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\SOFTWARE\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Oldsetup.exe Key opened \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Oldsetup.exe Key opened \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Oldsetup.exe Key opened \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Oldsetup.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 api.ipify.org 4 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4112 set thread context of 2384 4112 Oldsetup.exe 73 -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\Oldsetup.exe:a.dll Oldsetup.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4112 Oldsetup.exe 4112 Oldsetup.exe 4112 Oldsetup.exe 4112 Oldsetup.exe 2384 Oldsetup.exe 2384 Oldsetup.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2384 Oldsetup.exe Token: SeImpersonatePrivilege 2384 Oldsetup.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4112 wrote to memory of 2384 4112 Oldsetup.exe 73 PID 4112 wrote to memory of 2384 4112 Oldsetup.exe 73 PID 4112 wrote to memory of 2384 4112 Oldsetup.exe 73 PID 4112 wrote to memory of 2384 4112 Oldsetup.exe 73 PID 4112 wrote to memory of 2384 4112 Oldsetup.exe 73 PID 4112 wrote to memory of 2384 4112 Oldsetup.exe 73 PID 4112 wrote to memory of 2384 4112 Oldsetup.exe 73 PID 4112 wrote to memory of 2384 4112 Oldsetup.exe 73 PID 4112 wrote to memory of 2384 4112 Oldsetup.exe 73 PID 4112 wrote to memory of 2384 4112 Oldsetup.exe 73 PID 4112 wrote to memory of 2384 4112 Oldsetup.exe 73 PID 4112 wrote to memory of 2384 4112 Oldsetup.exe 73 PID 4112 wrote to memory of 2384 4112 Oldsetup.exe 73 PID 4112 wrote to memory of 2384 4112 Oldsetup.exe 73 PID 4112 wrote to memory of 2384 4112 Oldsetup.exe 73 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Oldsetup.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Oldsetup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Oldsetup.exe"C:\Users\Admin\AppData\Local\Temp\Oldsetup.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\Oldsetup.exe"C:\Users\Admin\AppData\Local\Temp\Oldsetup.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2384
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD598e56fc6276f5ea11ed37de5b40116d3
SHA1882fd2c385eeaffec3881b3262de638ff912f276
SHA2569006378885c4a84699ad0f90dbe7579969e3a1b41f6fd334c4e440d30a15d063
SHA512978c3f3e5e866db2cc59a3474a6b75291b3eba44d445887c2afd50218dce776a650822eb67118481e62411b02102c7e49a1dc99db507d4cca59d0253b5b1a19b