Analysis
-
max time kernel
95s -
max time network
145s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
10/10/2024, 14:06
Static task
static1
Behavioral task
behavioral1
Sample
Oldsetup.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Oldsetup.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
Oldsetup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
Oldsetup.exe
Resource
win11-20241007-en
General
-
Target
Oldsetup.exe
-
Size
2.6MB
-
MD5
98e56fc6276f5ea11ed37de5b40116d3
-
SHA1
882fd2c385eeaffec3881b3262de638ff912f276
-
SHA256
9006378885c4a84699ad0f90dbe7579969e3a1b41f6fd334c4e440d30a15d063
-
SHA512
978c3f3e5e866db2cc59a3474a6b75291b3eba44d445887c2afd50218dce776a650822eb67118481e62411b02102c7e49a1dc99db507d4cca59d0253b5b1a19b
-
SSDEEP
49152:HZPf0tL9d77T+WScpPNBqB0+iZjS9fQzm4qU0Hy+GtGHkyMaRV/EfZ8yd:EVScpPN3OHmUQ
Malware Config
Extracted
meduza
79.137.202.152
-
anti_dbg
true
-
anti_vm
false
-
build_name
OurOld2
-
extensions
.txt;.doc;.docx;.pdf;.xls;.xlsx;.log;.db;.sqlite
-
grabber_max_size
1.048576e+06
-
port
15666
-
self_destruct
true
Signatures
-
Meduza Stealer payload 5 IoCs
resource yara_rule behavioral4/memory/3988-8-0x0000000140000000-0x000000014013B000-memory.dmp family_meduza behavioral4/memory/3988-9-0x0000000140000000-0x000000014013B000-memory.dmp family_meduza behavioral4/memory/3988-11-0x0000000140000000-0x000000014013B000-memory.dmp family_meduza behavioral4/memory/3988-6-0x0000000140000000-0x000000014013B000-memory.dmp family_meduza behavioral4/memory/3988-20-0x0000000140000000-0x000000014013B000-memory.dmp family_meduza -
Executes dropped EXE 1 IoCs
pid Process 3988 Oldsetup.exe -
Loads dropped DLL 1 IoCs
pid Process 3324 Oldsetup.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Oldsetup.exe Key opened \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000\SOFTWARE\Microsoft\Office\12.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Oldsetup.exe Key opened \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000\SOFTWARE\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Oldsetup.exe Key opened \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Oldsetup.exe Key opened \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Oldsetup.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3324 set thread context of 3988 3324 Oldsetup.exe 77 -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\Oldsetup.exe:a.dll Oldsetup.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3324 Oldsetup.exe 3324 Oldsetup.exe 3324 Oldsetup.exe 3324 Oldsetup.exe 3988 Oldsetup.exe 3988 Oldsetup.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3988 Oldsetup.exe Token: SeImpersonatePrivilege 3988 Oldsetup.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3324 wrote to memory of 3988 3324 Oldsetup.exe 77 PID 3324 wrote to memory of 3988 3324 Oldsetup.exe 77 PID 3324 wrote to memory of 3988 3324 Oldsetup.exe 77 PID 3324 wrote to memory of 3988 3324 Oldsetup.exe 77 PID 3324 wrote to memory of 3988 3324 Oldsetup.exe 77 PID 3324 wrote to memory of 3988 3324 Oldsetup.exe 77 PID 3324 wrote to memory of 3988 3324 Oldsetup.exe 77 PID 3324 wrote to memory of 3988 3324 Oldsetup.exe 77 PID 3324 wrote to memory of 3988 3324 Oldsetup.exe 77 PID 3324 wrote to memory of 3988 3324 Oldsetup.exe 77 PID 3324 wrote to memory of 3988 3324 Oldsetup.exe 77 PID 3324 wrote to memory of 3988 3324 Oldsetup.exe 77 PID 3324 wrote to memory of 3988 3324 Oldsetup.exe 77 PID 3324 wrote to memory of 3988 3324 Oldsetup.exe 77 PID 3324 wrote to memory of 3988 3324 Oldsetup.exe 77 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Oldsetup.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Oldsetup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Oldsetup.exe"C:\Users\Admin\AppData\Local\Temp\Oldsetup.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Users\Admin\AppData\Local\Temp\Oldsetup.exe"C:\Users\Admin\AppData\Local\Temp\Oldsetup.exe"2⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:3988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD598e56fc6276f5ea11ed37de5b40116d3
SHA1882fd2c385eeaffec3881b3262de638ff912f276
SHA2569006378885c4a84699ad0f90dbe7579969e3a1b41f6fd334c4e440d30a15d063
SHA512978c3f3e5e866db2cc59a3474a6b75291b3eba44d445887c2afd50218dce776a650822eb67118481e62411b02102c7e49a1dc99db507d4cca59d0253b5b1a19b
-
Filesize
1.4MB
MD5217fadc021c5e644e590d0ec31a27702
SHA1074b2b10054362719e9d5dc346fbbd4607ee6e13
SHA256a05dbdb3c4e03ade632d6b338d683839fe068a3328654d3e066c944b18971f5d
SHA512466f5e7034268df4112cda2c330e81747b1cc5e76f6f5f6359290506c750da4fff2f198e2087523470c709951758d38d1a9f0490edb332c667b1952e931f24fa