Analysis
-
max time kernel
94s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-12-2024 01:30
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-12-18_e77b17460e9174ca86145bcdf460ad77_ryuk.exe
Resource
win7-20241010-en
2 signatures
150 seconds
General
-
Target
2024-12-18_e77b17460e9174ca86145bcdf460ad77_ryuk.exe
-
Size
4.1MB
-
MD5
e77b17460e9174ca86145bcdf460ad77
-
SHA1
a7eb88f9198eccc338f0deed8bd7cf3511d5639d
-
SHA256
ee3398bef56528ab467234c1e1cda885656a3c853d28f0ac4a6a660cf13a246e
-
SHA512
066926af4dcc1bbeca80bd9ad1ba51708b1348398dbf5cc703104b96a366d8185860c8bec7e077250852819c90d7735d8a0ca69f5e5c8a9a549342e5d5aea5db
-
SSDEEP
49152:Xl4UjB0jUuXwCMh4Y9SH3nzth5D+pH/BOvdSZARtFvBA:14UjKguFA
Malware Config
Extracted
Family
meduza
C2
5.252.155.28
Attributes
-
anti_dbg
true
-
anti_vm
true
-
build_name
781
-
extensions
none
-
grabber_max_size
1.048576e+06
-
links
none
-
port
15666
-
self_destruct
true
Signatures
-
Meduza Stealer payload 4 IoCs
resource yara_rule behavioral2/memory/4916-7-0x0000000140000000-0x0000000140141000-memory.dmp family_meduza behavioral2/memory/4916-6-0x0000000140000000-0x0000000140141000-memory.dmp family_meduza behavioral2/memory/4916-5-0x0000000140000000-0x0000000140141000-memory.dmp family_meduza behavioral2/memory/4916-4-0x0000000140000000-0x0000000140141000-memory.dmp family_meduza -
Meduza family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 2024-12-18_e77b17460e9174ca86145bcdf460ad77_ryuk.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3100 set thread context of 4916 3100 2024-12-18_e77b17460e9174ca86145bcdf460ad77_ryuk.exe 83 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4916 2024-12-18_e77b17460e9174ca86145bcdf460ad77_ryuk.exe Token: SeImpersonatePrivilege 4916 2024-12-18_e77b17460e9174ca86145bcdf460ad77_ryuk.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3100 wrote to memory of 4916 3100 2024-12-18_e77b17460e9174ca86145bcdf460ad77_ryuk.exe 83 PID 3100 wrote to memory of 4916 3100 2024-12-18_e77b17460e9174ca86145bcdf460ad77_ryuk.exe 83 PID 3100 wrote to memory of 4916 3100 2024-12-18_e77b17460e9174ca86145bcdf460ad77_ryuk.exe 83 PID 3100 wrote to memory of 4916 3100 2024-12-18_e77b17460e9174ca86145bcdf460ad77_ryuk.exe 83 PID 3100 wrote to memory of 4916 3100 2024-12-18_e77b17460e9174ca86145bcdf460ad77_ryuk.exe 83 PID 3100 wrote to memory of 4916 3100 2024-12-18_e77b17460e9174ca86145bcdf460ad77_ryuk.exe 83 PID 3100 wrote to memory of 4916 3100 2024-12-18_e77b17460e9174ca86145bcdf460ad77_ryuk.exe 83 PID 3100 wrote to memory of 4916 3100 2024-12-18_e77b17460e9174ca86145bcdf460ad77_ryuk.exe 83 PID 3100 wrote to memory of 4916 3100 2024-12-18_e77b17460e9174ca86145bcdf460ad77_ryuk.exe 83 PID 3100 wrote to memory of 4916 3100 2024-12-18_e77b17460e9174ca86145bcdf460ad77_ryuk.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-12-18_e77b17460e9174ca86145bcdf460ad77_ryuk.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-18_e77b17460e9174ca86145bcdf460ad77_ryuk.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\2024-12-18_e77b17460e9174ca86145bcdf460ad77_ryuk.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-18_e77b17460e9174ca86145bcdf460ad77_ryuk.exe"2⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:4916
-