Analysis

  • max time kernel
    146s
  • max time network
    151s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    12-10-2024 23:27

General

  • Target

    OceanicTools.exe

  • Size

    22.2MB

  • MD5

    f975ef6b34160bff3ba3c8c815f9e77c

  • SHA1

    4b818a41b68f8ed6f6719db14e19f955a60aebe8

  • SHA256

    ae04f1bc929f6f83a4010f59fcc1f78caea5d198ae3779c7e058608effcc56af

  • SHA512

    ba08c564b363affea6c39394955feb327a6c15cde9a5b83806088fcfdb4b4464deb24dcbca0e2cb5f26ae9172d7c8fb94ed58e0a534bf21deb4957363f67a222

  • SSDEEP

    98304:XHE3AU4FiZ0ZXawT/2MMlOLG9ffkTj8cywcAk:U3u0Z0EdM1LGdUjKA

Malware Config

Extracted

Family

meduza

C2

79.137.202.152

Attributes
  • anti_dbg

    true

  • anti_vm

    true

  • build_name

    Legenda

  • extensions

    .txt;.doc;.docx;.pdf;.xls;.xlsx;.log;.db;.sqlite

  • grabber_max_size

    1.048576e+06

  • port

    15666

  • self_destruct

    true

Signatures

  • Meduza

    Meduza is a crypto wallet and info stealer written in C++.

  • Meduza Stealer payload 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • NTFS ADS 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\OceanicTools.exe
    "C:\Users\Admin\AppData\Local\Temp\OceanicTools.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3392
    • C:\Windows\SYSTEM32\reg.exe
      "reg" "query" "SYSTEM\CurrentControlSet\Services\Disk\Enum"
      2⤵
        PID:4608
      • C:\Windows\System32\Wbem\wmic.exe
        "wmic" "computersystem" "get" "manufacturer"
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3044
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" "-Command" "$cmd = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('QWRkLU1wUHJlZmVyZW5jZSAtRXhjbHVzaW9uUGF0aCAiQzpcVXNlcnNcQWRtaW5ccGd1amN4eHRmaGJicnVxbyI=')); Invoke-Expression $cmd"
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1068
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" "-Command" "$cmd = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('QWRkLU1wUHJlZmVyZW5jZSAtRXhjbHVzaW9uUGF0aCAiQzpcVXNlcnNcQWRtaW5ccGd1amN4eHRmaGJicnVxb1xxa3dxcHN1bWxsYnhlenp1LmV4ZSI=')); Invoke-Expression $cmd"
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4184
      • C:\Users\Admin\pgujcxxtfhbbruqo\qkwqpsumllbxezzu.exe
        "C:\Users\Admin\pgujcxxtfhbbruqo\qkwqpsumllbxezzu.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • NTFS ADS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1540
        • C:\Users\Admin\pgujcxxtfhbbruqo\qkwqpsumllbxezzu.exe
          "C:\Users\Admin\pgujcxxtfhbbruqo\qkwqpsumllbxezzu.exe"
          3⤵
          • Executes dropped EXE
          • Accesses Microsoft Outlook profiles
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • outlook_office_path
          • outlook_win_path
          PID:2168
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\pgujcxxtfhbbruqo\qkwqpsumllbxezzu.exe"
            4⤵
            • System Network Configuration Discovery: Internet Connection Discovery
            • Suspicious use of WriteProcessMemory
            PID:1644
            • C:\Windows\system32\PING.EXE
              ping 1.1.1.1 -n 1 -w 3000
              5⤵
              • System Network Configuration Discovery: Internet Connection Discovery
              • Runs ping.exe
              PID:1852

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

      Filesize

      2KB

      MD5

      5f4c933102a824f41e258078e34165a7

      SHA1

      d2f9e997b2465d3ae7d91dad8d99b77a2332b6ee

      SHA256

      d69b7d84970cb04cd069299fd8aa9cef8394999588bead979104dc3cb743b4f2

      SHA512

      a7556b2be1a69dbc1f7ff4c1c25581a28cb885c7e1116632c535fee5facaa99067bcead8f02499980f1d999810157d0fc2f9e45c200dee7d379907ef98a6f034

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      1KB

      MD5

      d857ee2f6639a42a68ebfff90f404a00

      SHA1

      0325eb9c9ced9cd258d57e1d09eee72adff69129

      SHA256

      ebcae1dae5289bfa4678ef3d9c558f530354dc87091843a5bf8873cfc8e6c7ee

      SHA512

      2716c99710ba6963e16c8b862207f203ca3b5197d4bf51a3faf00a3dd48b2f8ac499fb99b4e018ff66c9ec8d7fa0805cb72d4b4fa6cef59f9368e9744601a38b

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_bjmgd3g3.ruh.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\pgujcxxtfhbbruqo\qkwqpsumllbxezzu.exe

      Filesize

      2.6MB

      MD5

      0c01cfc0685211b3c655c7a9526f1849

      SHA1

      864d23804b6e3c98efd1b56863a484b505ddf40b

      SHA256

      8d6ee227c57e825bc978db47c7587d46e7df06e3656d493486ee26b1426c98a6

      SHA512

      6024a41f371d77a82608c0e8ff314853404a50decb77838ace61c43a72ef954f4a227849b85e2aa3ef0749120e8361f13145006652596fb22b2f972bf7585719

    • C:\Users\Admin\pgujcxxtfhbbruqo\qkwqpsumllbxezzu.exe:a.dll

      Filesize

      1.4MB

      MD5

      bc690cc3a740f79f71732e6dba60b67a

      SHA1

      1b3b7107bdddcee5f10781f466a52f195190f342

      SHA256

      3fb6b027285db00651f0257df8f5ca9db5665a24a5e23f476cd3e71244bfbc7f

      SHA512

      bd090037334592f7000be3ec1ff3e77f4303f59f071a7fd6d21eee6b96d07d8aaf6f51725369f2823dd9e0fe2bc1f437bc0fc32ee7af2de2ed49c0b654bf521a

    • memory/1068-10-0x00007FFCA7330000-0x00007FFCA7DF2000-memory.dmp

      Filesize

      10.8MB

    • memory/1068-14-0x00007FFCA7330000-0x00007FFCA7DF2000-memory.dmp

      Filesize

      10.8MB

    • memory/1068-11-0x00007FFCA7330000-0x00007FFCA7DF2000-memory.dmp

      Filesize

      10.8MB

    • memory/1068-0-0x00007FFCA7333000-0x00007FFCA7335000-memory.dmp

      Filesize

      8KB

    • memory/1068-9-0x00000238EC0C0000-0x00000238EC0E2000-memory.dmp

      Filesize

      136KB

    • memory/1540-30-0x00007FF784E80000-0x00007FF785126000-memory.dmp

      Filesize

      2.6MB

    • memory/1540-38-0x00007FF784E80000-0x00007FF785126000-memory.dmp

      Filesize

      2.6MB

    • memory/2168-35-0x0000000140000000-0x000000014013B000-memory.dmp

      Filesize

      1.2MB

    • memory/2168-37-0x0000000140000000-0x000000014013B000-memory.dmp

      Filesize

      1.2MB