Analysis

  • max time kernel
    147s
  • max time network
    153s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250217-en
  • resource tags

    arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    28/02/2025, 19:18

General

  • Target

    Kraken Cheat.rar

  • Size

    10.6MB

  • MD5

    444fdd75524fa8456d8c6aceab7bcf27

  • SHA1

    24e7184b7e38106803739ca141de1738c6910f5d

  • SHA256

    d78d8879a87115794cab50ea760af9b769f77bd21789be9d7ff920742302edf6

  • SHA512

    2361c25d42a4ee1d376e89d3b04dcd7437b456455ab6c44c321fafbef5d7368d33cf5dabdbd00610bdf41bbca2b7e9a816d02e3c8f9bd403df66e2bf55c6e240

  • SSDEEP

    196608:RbmOKzBSBkDX6+UCcqWEeRf8+STSu+ioBPYSTPhYZzkoDEWMXqgI9dcx/zM:Rbl+BSBkT6+UCeAw9OS9YZAouO+zM

Malware Config

Extracted

Family

meduza

Botnet

444

C2

109.107.181.162

Attributes
  • anti_dbg

    true

  • anti_vm

    true

  • build_name

    444

  • extensions

    none

  • grabber_maximum_size

    1048576

  • links

    none

  • port

    15666

  • self_destruct

    true

Signatures

  • Meduza

    Meduza is a crypto wallet and info stealer written in C++.

  • Meduza Stealer payload 38 IoCs
  • Meduza family
  • Executes dropped EXE 4 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Kraken Cheat.rar"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1760
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:784
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\Kraken Cheat\Settings\settings.txt
      1⤵
        PID:3328
      • C:\Program Files\WindowsApps\Microsoft.WindowsTerminal_1.6.10571.0_x64__8wekyb3d8bbwe\wt.exe
        "C:\Users\Admin\AppData\Local\Microsoft\WindowsApps\Microsoft.WindowsTerminal_8wekyb3d8bbwe\wt.exe" -d "C:\Users\Admin\Desktop\Kraken Cheat\."
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:3300
        • C:\Program Files\WindowsApps\Microsoft.WindowsTerminal_1.6.10571.0_x64__8wekyb3d8bbwe\WindowsTerminal.exe
          wt.exe -d "C:\Users\Admin\Desktop\Kraken Cheat\."
          2⤵
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1604
          • C:\Windows\system32\wsl.exe
            C:\Windows\system32\wsl.exe --list
            3⤵
              PID:3008
            • C:\Program Files\WindowsApps\Microsoft.WindowsTerminal_1.6.10571.0_x64__8wekyb3d8bbwe\OpenConsole.exe
              "C:\Program Files\WindowsApps\Microsoft.WindowsTerminal_1.6.10571.0_x64__8wekyb3d8bbwe\OpenConsole.exe" --headless --win32input --resizeQuirk --width 120 --height 27 --signal 0xa34 --server 0xa2c
              3⤵
                PID:1424
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell.exe
                3⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2044
                • C:\Users\Admin\Desktop\Kraken Cheat\Kraken.exe
                  "C:\Users\Admin\Desktop\Kraken Cheat\Kraken.exe"
                  4⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:3168
                  • C:\Users\Admin\Desktop\Kraken Cheat\Kraken.exe
                    "C:\Users\Admin\Desktop\Kraken Cheat\Kraken.exe"
                    5⤵
                    • Executes dropped EXE
                    • Accesses Microsoft Outlook profiles
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    • outlook_office_path
                    • outlook_win_path
                    PID:3680
                    • C:\Windows\System32\cmd.exe
                      "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\Desktop\Kraken Cheat\Kraken.exe"
                      6⤵
                      • System Network Configuration Discovery: Internet Connection Discovery
                      • Suspicious use of WriteProcessMemory
                      PID:556
                      • C:\Windows\system32\PING.EXE
                        ping 1.1.1.1 -n 1 -w 3000
                        7⤵
                        • System Network Configuration Discovery: Internet Connection Discovery
                        • Runs ping.exe
                        PID:800
          • C:\Users\Admin\Desktop\Kraken Cheat\Kraken.exe
            "C:\Users\Admin\Desktop\Kraken Cheat\Kraken.exe"
            1⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:4584
            • C:\Users\Admin\Desktop\Kraken Cheat\Kraken.exe
              "C:\Users\Admin\Desktop\Kraken Cheat\Kraken.exe"
              2⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:3528

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_yydhnpo5.vtp.ps1

            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • C:\Users\Admin\Desktop\Kraken Cheat\Kraken.exe

            Filesize

            3.7MB

            MD5

            2efb1d6f632c13e3be57d710f190f8d0

            SHA1

            19437cafa11c6ae5fa27e35de3369cf0817a7dbb

            SHA256

            ca54bdbbd6238be2040eb965561f078e573569d8d2fa0756d02e2795276c62bf

            SHA512

            ae3a3fa1c142c5d57f641da0941364189ffe01daac6a4739d5d84508f0461451ef4c818cc1164d9cfab3ddbc6f613f94e26046fd7d613e42a7ec858dec29b38b

          • memory/2044-22-0x0000021A4B520000-0x0000021A4B566000-memory.dmp

            Filesize

            280KB

          • memory/2044-24-0x0000021A4B6F0000-0x0000021A4B766000-memory.dmp

            Filesize

            472KB

          • memory/2044-25-0x0000021A4B4F0000-0x0000021A4B50E000-memory.dmp

            Filesize

            120KB

          • memory/2044-18-0x0000021A4B0C0000-0x0000021A4B0E2000-memory.dmp

            Filesize

            136KB

          • memory/3528-46-0x0000000140000000-0x00000001401FA000-memory.dmp

            Filesize

            2.0MB

          • memory/3680-77-0x0000000140000000-0x00000001401FA000-memory.dmp

            Filesize

            2.0MB

          • memory/3680-107-0x0000000140000000-0x00000001401FA000-memory.dmp

            Filesize

            2.0MB

          • memory/3680-41-0x0000000140000000-0x00000001401FA000-memory.dmp

            Filesize

            2.0MB

          • memory/3680-40-0x0000000140000000-0x00000001401FA000-memory.dmp

            Filesize

            2.0MB

          • memory/3680-37-0x0000000140000000-0x00000001401FA000-memory.dmp

            Filesize

            2.0MB

          • memory/3680-36-0x0000000140000000-0x00000001401FA000-memory.dmp

            Filesize

            2.0MB

          • memory/3680-34-0x0000000140000000-0x00000001401FA000-memory.dmp

            Filesize

            2.0MB

          • memory/3680-32-0x00000000C0120000-0x00000000C0121000-memory.dmp

            Filesize

            4KB

          • memory/3680-31-0x0000000140000000-0x00000001401FA000-memory.dmp

            Filesize

            2.0MB

          • memory/3680-51-0x0000000140000000-0x00000001401FA000-memory.dmp

            Filesize

            2.0MB

          • memory/3680-52-0x0000000140000000-0x00000001401FA000-memory.dmp

            Filesize

            2.0MB

          • memory/3680-48-0x0000000140000000-0x00000001401FA000-memory.dmp

            Filesize

            2.0MB

          • memory/3680-47-0x0000000140000000-0x00000001401FA000-memory.dmp

            Filesize

            2.0MB

          • memory/3680-62-0x0000000140000000-0x00000001401FA000-memory.dmp

            Filesize

            2.0MB

          • memory/3680-61-0x0000000140000000-0x00000001401FA000-memory.dmp

            Filesize

            2.0MB

          • memory/3680-29-0x0000000140000000-0x00000001401FA000-memory.dmp

            Filesize

            2.0MB

          • memory/3680-80-0x0000000140000000-0x00000001401FA000-memory.dmp

            Filesize

            2.0MB

          • memory/3680-102-0x0000000140000000-0x00000001401FA000-memory.dmp

            Filesize

            2.0MB

          • memory/3680-108-0x0000000140000000-0x00000001401FA000-memory.dmp

            Filesize

            2.0MB

          • memory/3680-35-0x0000000140000000-0x00000001401FA000-memory.dmp

            Filesize

            2.0MB

          • memory/3680-104-0x0000000140000000-0x00000001401FA000-memory.dmp

            Filesize

            2.0MB

          • memory/3680-101-0x0000000140000000-0x00000001401FA000-memory.dmp

            Filesize

            2.0MB

          • memory/3680-96-0x0000000140000000-0x00000001401FA000-memory.dmp

            Filesize

            2.0MB

          • memory/3680-95-0x0000000140000000-0x00000001401FA000-memory.dmp

            Filesize

            2.0MB

          • memory/3680-90-0x0000000140000000-0x00000001401FA000-memory.dmp

            Filesize

            2.0MB

          • memory/3680-89-0x0000000140000000-0x00000001401FA000-memory.dmp

            Filesize

            2.0MB

          • memory/3680-86-0x0000000140000000-0x00000001401FA000-memory.dmp

            Filesize

            2.0MB

          • memory/3680-84-0x0000000140000000-0x00000001401FA000-memory.dmp

            Filesize

            2.0MB

          • memory/3680-83-0x0000000140000000-0x00000001401FA000-memory.dmp

            Filesize

            2.0MB

          • memory/3680-78-0x0000000140000000-0x00000001401FA000-memory.dmp

            Filesize

            2.0MB

          • memory/3680-74-0x0000000140000000-0x00000001401FA000-memory.dmp

            Filesize

            2.0MB

          • memory/3680-72-0x0000000140000000-0x00000001401FA000-memory.dmp

            Filesize

            2.0MB

          • memory/3680-71-0x0000000140000000-0x00000001401FA000-memory.dmp

            Filesize

            2.0MB

          • memory/3680-68-0x0000000140000000-0x00000001401FA000-memory.dmp

            Filesize

            2.0MB

          • memory/3680-66-0x0000000140000000-0x00000001401FA000-memory.dmp

            Filesize

            2.0MB

          • memory/3680-65-0x0000000140000000-0x00000001401FA000-memory.dmp

            Filesize

            2.0MB

          • memory/3680-115-0x0000000140000000-0x00000001401FA000-memory.dmp

            Filesize

            2.0MB

          • memory/3680-113-0x0000000140000000-0x00000001401FA000-memory.dmp

            Filesize

            2.0MB