Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
19-12-2024 20:23
Static task
static1
Behavioral task
behavioral1
Sample
Panel.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Panel.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Panel.exe
Resource
win11-20241007-en
General
-
Target
Panel.exe
-
Size
526.9MB
-
MD5
6a683ece84181f6b32980177840d3e24
-
SHA1
1116d53133e9c010ed98116ede1a29927f7b0920
-
SHA256
e9772d2d021c030a2a8685fcffc721a2a0fb94a65b13d097725e6a1e5419e395
-
SHA512
14a46fcbe64ce22ed628572eb02d2fd8ec35d2fcf09073910c05819526adc3fa02930b1d7bb88462c5c72fd87194779f90e867e668b49532fcc6ff4832c9e8d7
-
SSDEEP
98304:0JxFqrqnIGHYeUt7wSTsEitaAo4N/nl3x0NlBuQa3HUQ:wxFqrqnwtwSccAoKl3fQa3
Malware Config
Extracted
meduza
45.130.145.152
-
anti_dbg
true
-
anti_vm
true
-
build_name
Student
-
extensions
.txt;.doc;.docx;.pdf;.xls;.xlsx;.log;.db;.sqlite
-
grabber_max_size
3.145728e+06
-
port
15666
-
self_destruct
true
Signatures
-
Meduza Stealer payload 42 IoCs
resource yara_rule behavioral3/memory/4940-43-0x0000023585AA0000-0x0000023585C9A000-memory.dmp family_meduza behavioral3/memory/4940-44-0x0000023585AA0000-0x0000023585C9A000-memory.dmp family_meduza behavioral3/memory/4940-45-0x0000023585AA0000-0x0000023585C9A000-memory.dmp family_meduza behavioral3/memory/4940-46-0x0000023585AA0000-0x0000023585C9A000-memory.dmp family_meduza behavioral3/memory/4940-51-0x0000023585AA0000-0x0000023585C9A000-memory.dmp family_meduza behavioral3/memory/4940-50-0x0000023585AA0000-0x0000023585C9A000-memory.dmp family_meduza behavioral3/memory/4940-47-0x0000023585AA0000-0x0000023585C9A000-memory.dmp family_meduza behavioral3/memory/4940-37-0x0000023585AA0000-0x0000023585C9A000-memory.dmp family_meduza behavioral3/memory/4940-40-0x0000023585AA0000-0x0000023585C9A000-memory.dmp family_meduza behavioral3/memory/4940-39-0x0000023585AA0000-0x0000023585C9A000-memory.dmp family_meduza behavioral3/memory/4940-38-0x0000023585AA0000-0x0000023585C9A000-memory.dmp family_meduza behavioral3/memory/4940-60-0x0000023585AA0000-0x0000023585C9A000-memory.dmp family_meduza behavioral3/memory/4940-61-0x0000023585AA0000-0x0000023585C9A000-memory.dmp family_meduza behavioral3/memory/4940-66-0x0000023585AA0000-0x0000023585C9A000-memory.dmp family_meduza behavioral3/memory/4940-67-0x0000023585AA0000-0x0000023585C9A000-memory.dmp family_meduza behavioral3/memory/4940-73-0x0000023585AA0000-0x0000023585C9A000-memory.dmp family_meduza behavioral3/memory/4940-72-0x0000023585AA0000-0x0000023585C9A000-memory.dmp family_meduza behavioral3/memory/4940-69-0x0000023585AA0000-0x0000023585C9A000-memory.dmp family_meduza behavioral3/memory/4940-68-0x0000023585AA0000-0x0000023585C9A000-memory.dmp family_meduza behavioral3/memory/4940-90-0x0000023585AA0000-0x0000023585C9A000-memory.dmp family_meduza behavioral3/memory/4940-91-0x0000023585AA0000-0x0000023585C9A000-memory.dmp family_meduza behavioral3/memory/4940-115-0x0000023585AA0000-0x0000023585C9A000-memory.dmp family_meduza behavioral3/memory/4940-114-0x0000023585AA0000-0x0000023585C9A000-memory.dmp family_meduza behavioral3/memory/4940-108-0x0000023585AA0000-0x0000023585C9A000-memory.dmp family_meduza behavioral3/memory/4940-109-0x0000023585AA0000-0x0000023585C9A000-memory.dmp family_meduza behavioral3/memory/4940-105-0x0000023585AA0000-0x0000023585C9A000-memory.dmp family_meduza behavioral3/memory/4940-102-0x0000023585AA0000-0x0000023585C9A000-memory.dmp family_meduza behavioral3/memory/4940-97-0x0000023585AA0000-0x0000023585C9A000-memory.dmp family_meduza behavioral3/memory/4940-96-0x0000023585AA0000-0x0000023585C9A000-memory.dmp family_meduza behavioral3/memory/4940-87-0x0000023585AA0000-0x0000023585C9A000-memory.dmp family_meduza behavioral3/memory/4940-84-0x0000023585AA0000-0x0000023585C9A000-memory.dmp family_meduza behavioral3/memory/4940-81-0x0000023585AA0000-0x0000023585C9A000-memory.dmp family_meduza behavioral3/memory/4940-79-0x0000023585AA0000-0x0000023585C9A000-memory.dmp family_meduza behavioral3/memory/4940-78-0x0000023585AA0000-0x0000023585C9A000-memory.dmp family_meduza behavioral3/memory/4940-74-0x0000023585AA0000-0x0000023585C9A000-memory.dmp family_meduza behavioral3/memory/4940-104-0x0000023585AA0000-0x0000023585C9A000-memory.dmp family_meduza behavioral3/memory/4940-85-0x0000023585AA0000-0x0000023585C9A000-memory.dmp family_meduza behavioral3/memory/4940-75-0x0000023585AA0000-0x0000023585C9A000-memory.dmp family_meduza behavioral3/memory/4940-117-0x0000023585AA0000-0x0000023585C9A000-memory.dmp family_meduza behavioral3/memory/4940-116-0x0000023585AA0000-0x0000023585C9A000-memory.dmp family_meduza behavioral3/memory/4940-124-0x0000023585AA0000-0x0000023585C9A000-memory.dmp family_meduza behavioral3/memory/4940-127-0x0000023585AA0000-0x0000023585C9A000-memory.dmp family_meduza -
Meduza family
-
Executes dropped EXE 2 IoCs
pid Process 4940 589b74b5d8954a55a8e8fe9450d81779.exe 4132 f00ab7fd9908477798ed87b7ff525366.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000\SOFTWARE\Microsoft\Office\12.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 589b74b5d8954a55a8e8fe9450d81779.exe Key opened \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000\SOFTWARE\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 589b74b5d8954a55a8e8fe9450d81779.exe Key opened \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 589b74b5d8954a55a8e8fe9450d81779.exe Key opened \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 589b74b5d8954a55a8e8fe9450d81779.exe Key opened \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 589b74b5d8954a55a8e8fe9450d81779.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 api.ipify.org 1 api.ipify.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4696 cmd.exe 2492 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2492 PING.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3600 Panel.exe 4940 589b74b5d8954a55a8e8fe9450d81779.exe 4940 589b74b5d8954a55a8e8fe9450d81779.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeDebugPrivilege 3600 Panel.exe Token: SeIncreaseQuotaPrivilege 3600 Panel.exe Token: SeSecurityPrivilege 3600 Panel.exe Token: SeTakeOwnershipPrivilege 3600 Panel.exe Token: SeLoadDriverPrivilege 3600 Panel.exe Token: SeSystemProfilePrivilege 3600 Panel.exe Token: SeSystemtimePrivilege 3600 Panel.exe Token: SeProfSingleProcessPrivilege 3600 Panel.exe Token: SeIncBasePriorityPrivilege 3600 Panel.exe Token: SeCreatePagefilePrivilege 3600 Panel.exe Token: SeBackupPrivilege 3600 Panel.exe Token: SeRestorePrivilege 3600 Panel.exe Token: SeShutdownPrivilege 3600 Panel.exe Token: SeDebugPrivilege 3600 Panel.exe Token: SeSystemEnvironmentPrivilege 3600 Panel.exe Token: SeRemoteShutdownPrivilege 3600 Panel.exe Token: SeUndockPrivilege 3600 Panel.exe Token: SeManageVolumePrivilege 3600 Panel.exe Token: 33 3600 Panel.exe Token: 34 3600 Panel.exe Token: 35 3600 Panel.exe Token: 36 3600 Panel.exe Token: SeDebugPrivilege 4940 589b74b5d8954a55a8e8fe9450d81779.exe Token: SeImpersonatePrivilege 4940 589b74b5d8954a55a8e8fe9450d81779.exe Token: SeIncreaseQuotaPrivilege 3600 Panel.exe Token: SeSecurityPrivilege 3600 Panel.exe Token: SeTakeOwnershipPrivilege 3600 Panel.exe Token: SeLoadDriverPrivilege 3600 Panel.exe Token: SeSystemProfilePrivilege 3600 Panel.exe Token: SeSystemtimePrivilege 3600 Panel.exe Token: SeProfSingleProcessPrivilege 3600 Panel.exe Token: SeIncBasePriorityPrivilege 3600 Panel.exe Token: SeCreatePagefilePrivilege 3600 Panel.exe Token: SeBackupPrivilege 3600 Panel.exe Token: SeRestorePrivilege 3600 Panel.exe Token: SeShutdownPrivilege 3600 Panel.exe Token: SeDebugPrivilege 3600 Panel.exe Token: SeSystemEnvironmentPrivilege 3600 Panel.exe Token: SeRemoteShutdownPrivilege 3600 Panel.exe Token: SeUndockPrivilege 3600 Panel.exe Token: SeManageVolumePrivilege 3600 Panel.exe Token: 33 3600 Panel.exe Token: 34 3600 Panel.exe Token: 35 3600 Panel.exe Token: 36 3600 Panel.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3600 wrote to memory of 4940 3600 Panel.exe 79 PID 3600 wrote to memory of 4940 3600 Panel.exe 79 PID 3600 wrote to memory of 4132 3600 Panel.exe 80 PID 3600 wrote to memory of 4132 3600 Panel.exe 80 PID 4940 wrote to memory of 4696 4940 589b74b5d8954a55a8e8fe9450d81779.exe 81 PID 4940 wrote to memory of 4696 4940 589b74b5d8954a55a8e8fe9450d81779.exe 81 PID 4696 wrote to memory of 2492 4696 cmd.exe 83 PID 4696 wrote to memory of 2492 4696 cmd.exe 83 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 589b74b5d8954a55a8e8fe9450d81779.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 589b74b5d8954a55a8e8fe9450d81779.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Panel.exe"C:\Users\Admin\AppData\Local\Temp\Panel.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Users\Admin\AppData\Local\Temp\589b74b5d8954a55a8e8fe9450d81779.exe"C:\Users\Admin\AppData\Local\Temp\589b74b5d8954a55a8e8fe9450d81779.exe"2⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:4940 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\589b74b5d8954a55a8e8fe9450d81779.exe"3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 30004⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2492
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\f00ab7fd9908477798ed87b7ff525366.exe"C:\Users\Admin\AppData\Local\Temp\f00ab7fd9908477798ed87b7ff525366.exe"2⤵
- Executes dropped EXE
PID:4132
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD541f92168b17f6f6e3f0c2dd847b8790c
SHA1d72086c8d7cf22ee4a212a8aafbf2c1cfbb68db4
SHA2564a5229e0157022f1f1e52bc9ddef08d3495094f596ec8b861f82778f13664ddc
SHA51251993dd5aed96c4dc4863ad9126be8f8e651b363cde9042561fc9fa1c9f19febacc786c9dbde8c148cd6eaf28b536e3056582e5413e507f67d4981ddde8a001f
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.6MB
MD55ad98066bfaea71873af260814cdebb0
SHA15dc890fd83e13d1b3b9ffc8b9e691bf5923fe7d4
SHA256bec45a7561b438237598f772b08e4e67f480e2330619fb3e7cd175156627c5f8
SHA5124373e339b09fef72e8da394933b42a04ff4c9b1e31636c0cad6a0fc8d60d7a4e23b43d744f3725fb506078fdb2521879c785978e1aef066898eb3762a72b262e