Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2024 16:24
Static task
static1
Behavioral task
behavioral1
Sample
ae2414d162454346d9a520ea3835e94c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ae2414d162454346d9a520ea3835e94c.exe
Resource
win10v2004-20241007-en
General
-
Target
ae2414d162454346d9a520ea3835e94c.exe
-
Size
2.6MB
-
MD5
ae2414d162454346d9a520ea3835e94c
-
SHA1
00e18ceba9a29bf1faaffa45007504af1d9f8825
-
SHA256
5a9437344ef2448175995360fbb9f7d7baefc26dc28bdc4b4a01df7187170fc5
-
SHA512
a6e67234476def220ca5431f974b454aeee4dda9f7e1d6f949c19457c5ab843cc7ae845bf16530870a40574c57d4c519972b094ba40ec0f8055d7bcb493a9beb
-
SSDEEP
49152:JZPf0tL9d77T+WScpPNBqB0+imjS9fQzQ7D0LSrydeJgUgLw+Q:yVScpPN3AfaIL+
Malware Config
Extracted
meduza
79.137.202.152
-
anti_dbg
true
-
anti_vm
false
-
build_name
OurOld2
-
extensions
.txt;.doc;.docx;.pdf;.xls;.xlsx;.log;.db;.sqlite
-
grabber_max_size
1.048576e+06
-
port
15666
-
self_destruct
true
Signatures
-
Meduza Stealer payload 6 IoCs
resource yara_rule behavioral2/memory/4500-8-0x0000000140000000-0x000000014013B000-memory.dmp family_meduza behavioral2/memory/4500-10-0x0000000140000000-0x000000014013B000-memory.dmp family_meduza behavioral2/memory/4500-7-0x0000000140000000-0x000000014013B000-memory.dmp family_meduza behavioral2/memory/4500-5-0x0000000140000000-0x000000014013B000-memory.dmp family_meduza behavioral2/memory/4500-19-0x0000000140000000-0x000000014013B000-memory.dmp family_meduza behavioral2/memory/4500-20-0x0000000140000000-0x000000014013B000-memory.dmp family_meduza -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation ae2414d162454346d9a520ea3835e94c.exe -
Executes dropped EXE 1 IoCs
pid Process 4500 ae2414d162454346d9a520ea3835e94c.exe -
Loads dropped DLL 1 IoCs
pid Process 3608 ae2414d162454346d9a520ea3835e94c.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ae2414d162454346d9a520ea3835e94c.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Office\12.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ae2414d162454346d9a520ea3835e94c.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ae2414d162454346d9a520ea3835e94c.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ae2414d162454346d9a520ea3835e94c.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ae2414d162454346d9a520ea3835e94c.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 17 api.ipify.org 18 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3608 set thread context of 4500 3608 ae2414d162454346d9a520ea3835e94c.exe 87 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3628 cmd.exe 2176 PING.EXE -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\ae2414d162454346d9a520ea3835e94c.exe:a.dll ae2414d162454346d9a520ea3835e94c.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2176 PING.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3608 ae2414d162454346d9a520ea3835e94c.exe 3608 ae2414d162454346d9a520ea3835e94c.exe 3608 ae2414d162454346d9a520ea3835e94c.exe 3608 ae2414d162454346d9a520ea3835e94c.exe 4500 ae2414d162454346d9a520ea3835e94c.exe 4500 ae2414d162454346d9a520ea3835e94c.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4500 ae2414d162454346d9a520ea3835e94c.exe Token: SeImpersonatePrivilege 4500 ae2414d162454346d9a520ea3835e94c.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 3608 wrote to memory of 4500 3608 ae2414d162454346d9a520ea3835e94c.exe 87 PID 3608 wrote to memory of 4500 3608 ae2414d162454346d9a520ea3835e94c.exe 87 PID 3608 wrote to memory of 4500 3608 ae2414d162454346d9a520ea3835e94c.exe 87 PID 3608 wrote to memory of 4500 3608 ae2414d162454346d9a520ea3835e94c.exe 87 PID 3608 wrote to memory of 4500 3608 ae2414d162454346d9a520ea3835e94c.exe 87 PID 3608 wrote to memory of 4500 3608 ae2414d162454346d9a520ea3835e94c.exe 87 PID 3608 wrote to memory of 4500 3608 ae2414d162454346d9a520ea3835e94c.exe 87 PID 3608 wrote to memory of 4500 3608 ae2414d162454346d9a520ea3835e94c.exe 87 PID 3608 wrote to memory of 4500 3608 ae2414d162454346d9a520ea3835e94c.exe 87 PID 3608 wrote to memory of 4500 3608 ae2414d162454346d9a520ea3835e94c.exe 87 PID 3608 wrote to memory of 4500 3608 ae2414d162454346d9a520ea3835e94c.exe 87 PID 3608 wrote to memory of 4500 3608 ae2414d162454346d9a520ea3835e94c.exe 87 PID 3608 wrote to memory of 4500 3608 ae2414d162454346d9a520ea3835e94c.exe 87 PID 3608 wrote to memory of 4500 3608 ae2414d162454346d9a520ea3835e94c.exe 87 PID 3608 wrote to memory of 4500 3608 ae2414d162454346d9a520ea3835e94c.exe 87 PID 4500 wrote to memory of 3628 4500 ae2414d162454346d9a520ea3835e94c.exe 91 PID 4500 wrote to memory of 3628 4500 ae2414d162454346d9a520ea3835e94c.exe 91 PID 3628 wrote to memory of 2176 3628 cmd.exe 93 PID 3628 wrote to memory of 2176 3628 cmd.exe 93 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ae2414d162454346d9a520ea3835e94c.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ae2414d162454346d9a520ea3835e94c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae2414d162454346d9a520ea3835e94c.exe"C:\Users\Admin\AppData\Local\Temp\ae2414d162454346d9a520ea3835e94c.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\ae2414d162454346d9a520ea3835e94c.exe"C:\Users\Admin\AppData\Local\Temp\ae2414d162454346d9a520ea3835e94c.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:4500 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\ae2414d162454346d9a520ea3835e94c.exe"3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 30004⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2176
-
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5ae2414d162454346d9a520ea3835e94c
SHA100e18ceba9a29bf1faaffa45007504af1d9f8825
SHA2565a9437344ef2448175995360fbb9f7d7baefc26dc28bdc4b4a01df7187170fc5
SHA512a6e67234476def220ca5431f974b454aeee4dda9f7e1d6f949c19457c5ab843cc7ae845bf16530870a40574c57d4c519972b094ba40ec0f8055d7bcb493a9beb
-
Filesize
1.4MB
MD5faf6cf4fa2c6acdbd73dbbfb23bd39dd
SHA12dcef2ddcb5d9d40a070a4646804e29b766236b4
SHA256cf3d4b66bb6547b0699bafe2dc7a954c8241df5529f219e8724d7b3824516696
SHA51266c497d3c5ab1db8abdec19f88d3f2692dc6d6240f7ff9510da8ef716bcd49b8356e357153ed8ff77dcaa5738a007fe12734ae8680fc0cf20d1f93ee1f21e4fb