Analysis

  • max time kernel
    64s
  • max time network
    66s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/11/2024, 09:36

General

  • Target

    Setup5.0.zip

  • Size

    2.3MB

  • MD5

    d7d4d1c2aa4cbda1118cd1a9ba8c8092

  • SHA1

    0935cb34d76369f11ec09c1af2f0320699687bec

  • SHA256

    3a82d1297c523205405817a019d3923c8f6c8b4802e4e4676d562b17973b21ea

  • SHA512

    d96d6769afc7af04b80a863895009cd79c8c1f9f68d8631829484611dfce7d4f1c75fc9b54157482975c6968a46e635e533d0cad687ef856ddc81ab3444bb553

  • SSDEEP

    49152:Bx8Jh672TFZ620k0OVCnqeDkHjmxg7ux43NAhxg4fTrQ:BxYVNvVCn9DkDnrNfqTrQ

Malware Config

Extracted

Family

meduza

C2

109.107.181.162

Attributes
  • anti_dbg

    true

  • anti_vm

    true

  • build_name

    6

  • extensions

    none

  • grabber_max_size

    1.048576e+06

  • links

    none

  • port

    15666

  • self_destruct

    true

Signatures

  • Meduza

    Meduza is a crypto wallet and info stealer written in C++.

  • Meduza Stealer payload 6 IoCs
  • Meduza family
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 10 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Setup5.0.zip"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:4548
    • C:\Users\Admin\AppData\Local\Temp\7zO4C1FE5F7\setup7.0.exe
      "C:\Users\Admin\AppData\Local\Temp\7zO4C1FE5F7\setup7.0.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1872
      • C:\Users\Admin\AppData\Local\Temp\7zO4C1FE5F7\setup7.0.exe
        C:\Users\Admin\AppData\Local\Temp\7zO4C1FE5F7\setup7.0.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1684
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\7zO4C1FE5F7\setup7.0.exe"
          4⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          • Suspicious use of WriteProcessMemory
          PID:952
          • C:\Windows\system32\PING.EXE
            ping 1.1.1.1 -n 1 -w 3000
            5⤵
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:4584
    • C:\Users\Admin\AppData\Local\Temp\7zO4C10BD58\setup7.0.exe
      "C:\Users\Admin\AppData\Local\Temp\7zO4C10BD58\setup7.0.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2020
      • C:\Users\Admin\AppData\Local\Temp\7zO4C10BD58\setup7.0.exe
        C:\Users\Admin\AppData\Local\Temp\7zO4C10BD58\setup7.0.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        • outlook_office_path
        • outlook_win_path
        PID:4124
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\7zO4C10BD58\setup7.0.exe"
          4⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          • Suspicious use of WriteProcessMemory
          PID:4648
          • C:\Windows\system32\PING.EXE
            ping 1.1.1.1 -n 1 -w 3000
            5⤵
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:1384

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12

          Filesize

          1KB

          MD5

          67e486b2f148a3fca863728242b6273e

          SHA1

          452a84c183d7ea5b7c015b597e94af8eef66d44a

          SHA256

          facaf1c3a4bf232abce19a2d534e495b0d3adc7dbe3797d336249aa6f70adcfb

          SHA512

          d3a37da3bb10a9736dc03e8b2b49baceef5d73c026e2077b8ebc1b786f2c9b2f807e0aa13a5866cf3b3cafd2bc506242ef139c423eaffb050bbb87773e53881e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8

          Filesize

          436B

          MD5

          971c514f84bba0785f80aa1c23edfd79

          SHA1

          732acea710a87530c6b08ecdf32a110d254a54c8

          SHA256

          f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895

          SHA512

          43dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12

          Filesize

          174B

          MD5

          0d81777cff9c63a4fb8ac96ed62162e1

          SHA1

          c922dd971752e4d84405b2a169c20f764000c624

          SHA256

          5c8badbdd8f45985b4802759ed4767fc7daf545c96eee7f5a72e19df2ce583c7

          SHA512

          4b4a7961d3e4669e28bc4aebb7702e3131362ed28bf0e4fb7fcb372b677ca251fbce93c5f8328a7d9734146891cc9b848c2379188e17bbf6cb749376fb4eb626

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8

          Filesize

          170B

          MD5

          abac3af63cd0cc06a828f4514f4baf58

          SHA1

          151eacdd422c515aeca78b5d2c74126d1bb0abad

          SHA256

          9805dcd80342973e7267a9a3350fe9c3a7e63cab17482b3e818fd2b452348192

          SHA512

          77ddaf98eb1db425c55b987f895df350bf75ef599951314587c0c79520067629c54bd874039ced2c4ac80fdcf91abde50db33302c3089d14e303b07101d5ae3d

        • C:\Users\Admin\AppData\Local\Temp\7zO4C1FE5F7\setup7.0.exe

          Filesize

          3.6MB

          MD5

          d38571e4500bd3936c55ab41b7d40c4b

          SHA1

          b7dfcd284dd985b92c4ab45e13bfc45dcf067ac5

          SHA256

          ec711f3d9eb360eb08ef30c0b315de37a59da35bd6e332d8f19d18fc480d9a3c

          SHA512

          324e71c33eab94097b4e0cc0b6d28d8bdbca1739282b6b1fafdbb440ba2ab69d256b4905046edd719bdf20192440d160193f983f2217ccaf4972b5617a2a592a

        • memory/1684-9-0x0000000140000000-0x000000014013E000-memory.dmp

          Filesize

          1.2MB

        • memory/1684-11-0x0000000140000000-0x000000014013E000-memory.dmp

          Filesize

          1.2MB

        • memory/1684-12-0x0000000140000000-0x000000014013E000-memory.dmp

          Filesize

          1.2MB

        • memory/1684-13-0x0000000140000000-0x000000014013E000-memory.dmp

          Filesize

          1.2MB

        • memory/1684-20-0x0000000140000000-0x000000014013E000-memory.dmp

          Filesize

          1.2MB

        • memory/4124-32-0x0000000140000000-0x000000014013E000-memory.dmp

          Filesize

          1.2MB