Analysis
-
max time kernel
91s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2024 20:23
Static task
static1
Behavioral task
behavioral1
Sample
Panel.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Panel.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Panel.exe
Resource
win11-20241007-en
General
-
Target
Panel.exe
-
Size
526.9MB
-
MD5
6a683ece84181f6b32980177840d3e24
-
SHA1
1116d53133e9c010ed98116ede1a29927f7b0920
-
SHA256
e9772d2d021c030a2a8685fcffc721a2a0fb94a65b13d097725e6a1e5419e395
-
SHA512
14a46fcbe64ce22ed628572eb02d2fd8ec35d2fcf09073910c05819526adc3fa02930b1d7bb88462c5c72fd87194779f90e867e668b49532fcc6ff4832c9e8d7
-
SSDEEP
98304:0JxFqrqnIGHYeUt7wSTsEitaAo4N/nl3x0NlBuQa3HUQ:wxFqrqnwtwSccAoKl3fQa3
Malware Config
Extracted
meduza
45.130.145.152
-
anti_dbg
true
-
anti_vm
true
-
build_name
Student
-
extensions
.txt;.doc;.docx;.pdf;.xls;.xlsx;.log;.db;.sqlite
-
grabber_max_size
3.145728e+06
-
port
15666
-
self_destruct
true
Signatures
-
Meduza Stealer payload 41 IoCs
resource yara_rule behavioral2/memory/3508-49-0x000001EA2B600000-0x000001EA2B7FA000-memory.dmp family_meduza behavioral2/memory/3508-45-0x000001EA2B600000-0x000001EA2B7FA000-memory.dmp family_meduza behavioral2/memory/3508-42-0x000001EA2B600000-0x000001EA2B7FA000-memory.dmp family_meduza behavioral2/memory/3508-41-0x000001EA2B600000-0x000001EA2B7FA000-memory.dmp family_meduza behavioral2/memory/3508-40-0x000001EA2B600000-0x000001EA2B7FA000-memory.dmp family_meduza behavioral2/memory/3508-39-0x000001EA2B600000-0x000001EA2B7FA000-memory.dmp family_meduza behavioral2/memory/3508-55-0x000001EA2B600000-0x000001EA2B7FA000-memory.dmp family_meduza behavioral2/memory/3508-54-0x000001EA2B600000-0x000001EA2B7FA000-memory.dmp family_meduza behavioral2/memory/3508-51-0x000001EA2B600000-0x000001EA2B7FA000-memory.dmp family_meduza behavioral2/memory/3508-50-0x000001EA2B600000-0x000001EA2B7FA000-memory.dmp family_meduza behavioral2/memory/3508-63-0x000001EA2B600000-0x000001EA2B7FA000-memory.dmp family_meduza behavioral2/memory/3508-62-0x000001EA2B600000-0x000001EA2B7FA000-memory.dmp family_meduza behavioral2/memory/3508-67-0x000001EA2B600000-0x000001EA2B7FA000-memory.dmp family_meduza behavioral2/memory/3508-68-0x000001EA2B600000-0x000001EA2B7FA000-memory.dmp family_meduza behavioral2/memory/3508-73-0x000001EA2B600000-0x000001EA2B7FA000-memory.dmp family_meduza behavioral2/memory/3508-72-0x000001EA2B600000-0x000001EA2B7FA000-memory.dmp family_meduza behavioral2/memory/3508-105-0x000001EA2B600000-0x000001EA2B7FA000-memory.dmp family_meduza behavioral2/memory/3508-109-0x000001EA2B600000-0x000001EA2B7FA000-memory.dmp family_meduza behavioral2/memory/3508-115-0x000001EA2B600000-0x000001EA2B7FA000-memory.dmp family_meduza behavioral2/memory/3508-114-0x000001EA2B600000-0x000001EA2B7FA000-memory.dmp family_meduza behavioral2/memory/3508-108-0x000001EA2B600000-0x000001EA2B7FA000-memory.dmp family_meduza behavioral2/memory/3508-103-0x000001EA2B600000-0x000001EA2B7FA000-memory.dmp family_meduza behavioral2/memory/3508-117-0x000001EA2B600000-0x000001EA2B7FA000-memory.dmp family_meduza behavioral2/memory/3508-116-0x000001EA2B600000-0x000001EA2B7FA000-memory.dmp family_meduza behavioral2/memory/3508-102-0x000001EA2B600000-0x000001EA2B7FA000-memory.dmp family_meduza behavioral2/memory/3508-97-0x000001EA2B600000-0x000001EA2B7FA000-memory.dmp family_meduza behavioral2/memory/3508-96-0x000001EA2B600000-0x000001EA2B7FA000-memory.dmp family_meduza behavioral2/memory/3508-91-0x000001EA2B600000-0x000001EA2B7FA000-memory.dmp family_meduza behavioral2/memory/3508-87-0x000001EA2B600000-0x000001EA2B7FA000-memory.dmp family_meduza behavioral2/memory/3508-85-0x000001EA2B600000-0x000001EA2B7FA000-memory.dmp family_meduza behavioral2/memory/3508-84-0x000001EA2B600000-0x000001EA2B7FA000-memory.dmp family_meduza behavioral2/memory/3508-81-0x000001EA2B600000-0x000001EA2B7FA000-memory.dmp family_meduza behavioral2/memory/3508-79-0x000001EA2B600000-0x000001EA2B7FA000-memory.dmp family_meduza behavioral2/memory/3508-78-0x000001EA2B600000-0x000001EA2B7FA000-memory.dmp family_meduza behavioral2/memory/3508-75-0x000001EA2B600000-0x000001EA2B7FA000-memory.dmp family_meduza behavioral2/memory/3508-74-0x000001EA2B600000-0x000001EA2B7FA000-memory.dmp family_meduza behavioral2/memory/3508-90-0x000001EA2B600000-0x000001EA2B7FA000-memory.dmp family_meduza behavioral2/memory/3508-69-0x000001EA2B600000-0x000001EA2B7FA000-memory.dmp family_meduza behavioral2/memory/3508-66-0x000001EA2B600000-0x000001EA2B7FA000-memory.dmp family_meduza behavioral2/memory/3508-126-0x000001EA2B600000-0x000001EA2B7FA000-memory.dmp family_meduza behavioral2/memory/3508-129-0x000001EA2B600000-0x000001EA2B7FA000-memory.dmp family_meduza -
Meduza family
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation Panel.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 15688e25446a4048a5cf4a0827656add.exe -
Executes dropped EXE 2 IoCs
pid Process 3508 15688e25446a4048a5cf4a0827656add.exe 3752 e29e9bb4f50b4901a7b05d1d6a4d5344.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 15688e25446a4048a5cf4a0827656add.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Office\12.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 15688e25446a4048a5cf4a0827656add.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 15688e25446a4048a5cf4a0827656add.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 15688e25446a4048a5cf4a0827656add.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 15688e25446a4048a5cf4a0827656add.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 24 api.ipify.org 25 api.ipify.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3020 cmd.exe 2276 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2276 PING.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 524 Panel.exe 3508 15688e25446a4048a5cf4a0827656add.exe 3508 15688e25446a4048a5cf4a0827656add.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeDebugPrivilege 524 Panel.exe Token: SeIncreaseQuotaPrivilege 524 Panel.exe Token: SeSecurityPrivilege 524 Panel.exe Token: SeTakeOwnershipPrivilege 524 Panel.exe Token: SeLoadDriverPrivilege 524 Panel.exe Token: SeSystemProfilePrivilege 524 Panel.exe Token: SeSystemtimePrivilege 524 Panel.exe Token: SeProfSingleProcessPrivilege 524 Panel.exe Token: SeIncBasePriorityPrivilege 524 Panel.exe Token: SeCreatePagefilePrivilege 524 Panel.exe Token: SeBackupPrivilege 524 Panel.exe Token: SeRestorePrivilege 524 Panel.exe Token: SeShutdownPrivilege 524 Panel.exe Token: SeDebugPrivilege 524 Panel.exe Token: SeSystemEnvironmentPrivilege 524 Panel.exe Token: SeRemoteShutdownPrivilege 524 Panel.exe Token: SeUndockPrivilege 524 Panel.exe Token: SeManageVolumePrivilege 524 Panel.exe Token: 33 524 Panel.exe Token: 34 524 Panel.exe Token: 35 524 Panel.exe Token: 36 524 Panel.exe Token: SeIncreaseQuotaPrivilege 524 Panel.exe Token: SeSecurityPrivilege 524 Panel.exe Token: SeTakeOwnershipPrivilege 524 Panel.exe Token: SeLoadDriverPrivilege 524 Panel.exe Token: SeSystemProfilePrivilege 524 Panel.exe Token: SeSystemtimePrivilege 524 Panel.exe Token: SeProfSingleProcessPrivilege 524 Panel.exe Token: SeIncBasePriorityPrivilege 524 Panel.exe Token: SeCreatePagefilePrivilege 524 Panel.exe Token: SeBackupPrivilege 524 Panel.exe Token: SeRestorePrivilege 524 Panel.exe Token: SeShutdownPrivilege 524 Panel.exe Token: SeDebugPrivilege 524 Panel.exe Token: SeSystemEnvironmentPrivilege 524 Panel.exe Token: SeRemoteShutdownPrivilege 524 Panel.exe Token: SeUndockPrivilege 524 Panel.exe Token: SeManageVolumePrivilege 524 Panel.exe Token: 33 524 Panel.exe Token: 34 524 Panel.exe Token: 35 524 Panel.exe Token: 36 524 Panel.exe Token: SeDebugPrivilege 3508 15688e25446a4048a5cf4a0827656add.exe Token: SeImpersonatePrivilege 3508 15688e25446a4048a5cf4a0827656add.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 524 wrote to memory of 3508 524 Panel.exe 96 PID 524 wrote to memory of 3508 524 Panel.exe 96 PID 524 wrote to memory of 3752 524 Panel.exe 97 PID 524 wrote to memory of 3752 524 Panel.exe 97 PID 3508 wrote to memory of 3020 3508 15688e25446a4048a5cf4a0827656add.exe 104 PID 3508 wrote to memory of 3020 3508 15688e25446a4048a5cf4a0827656add.exe 104 PID 3020 wrote to memory of 2276 3020 cmd.exe 106 PID 3020 wrote to memory of 2276 3020 cmd.exe 106 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 15688e25446a4048a5cf4a0827656add.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 15688e25446a4048a5cf4a0827656add.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Panel.exe"C:\Users\Admin\AppData\Local\Temp\Panel.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Users\Admin\AppData\Local\Temp\15688e25446a4048a5cf4a0827656add.exe"C:\Users\Admin\AppData\Local\Temp\15688e25446a4048a5cf4a0827656add.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:3508 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\15688e25446a4048a5cf4a0827656add.exe"3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 30004⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2276
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\e29e9bb4f50b4901a7b05d1d6a4d5344.exe"C:\Users\Admin\AppData\Local\Temp\e29e9bb4f50b4901a7b05d1d6a4d5344.exe"2⤵
- Executes dropped EXE
PID:3752
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD541f92168b17f6f6e3f0c2dd847b8790c
SHA1d72086c8d7cf22ee4a212a8aafbf2c1cfbb68db4
SHA2564a5229e0157022f1f1e52bc9ddef08d3495094f596ec8b861f82778f13664ddc
SHA51251993dd5aed96c4dc4863ad9126be8f8e651b363cde9042561fc9fa1c9f19febacc786c9dbde8c148cd6eaf28b536e3056582e5413e507f67d4981ddde8a001f
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.6MB
MD55ad98066bfaea71873af260814cdebb0
SHA15dc890fd83e13d1b3b9ffc8b9e691bf5923fe7d4
SHA256bec45a7561b438237598f772b08e4e67f480e2330619fb3e7cd175156627c5f8
SHA5124373e339b09fef72e8da394933b42a04ff4c9b1e31636c0cad6a0fc8d60d7a4e23b43d744f3725fb506078fdb2521879c785978e1aef066898eb3762a72b262e