| File name: | 18f456bc4bc4f55266f7456bfabe1f343560b6a59a3f5a68e995a34c0563a760.exe |
| Full analysis: | https://app.any.run/tasks/c5d4c875-d25e-40e5-a051-d41d8688e870 |
| Verdict: | Malicious activity |
| Threats: | MetaStealer is an info-stealing malware primarily targeting sensitive data like login credentials, payment details, and browser history. It typically infects systems via phishing emails or malicious downloads and can exfiltrate data to a command and control (C2) server. MetaStealer is known for its stealthy techniques, including evasion and persistence mechanisms, which make it difficult to detect. This malware has been actively used in various cyberattacks, particularly for financial theft and credential harvesting from individuals and organizations. |
| Analysis date: | July 03, 2024, 18:37:52 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32+ executable (GUI) x86-64, for MS Windows |
| MD5: | EDC8DC2A71AF650C1C6272EFA564ADC3 |
| SHA1: | 697581B70BF91793B76F61A60ACEC8FC764B1679 |
| SHA256: | 18F456BC4BC4F55266F7456BFABE1F343560B6A59A3F5A68E995A34C0563A760 |
| SSDEEP: | 196608:YnnG+D/I5NdBFwXVf/VKALqjIa4ESnfK0p:YnnG+LUdBFwFlKA2saofvp |
| .exe | | | Win64 Executable (generic) (87.3) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (6.3) |
| .exe | | | DOS Executable Generic (6.3) |
| MachineType: | AMD AMD64 |
|---|---|
| TimeStamp: | 2024:02:26 09:01:55+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32+ |
| LinkerVersion: | 14.33 |
| CodeSize: | 236032 |
| InitializedDataSize: | 118784 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x26670 |
| OSVersion: | 5.2 |
| ImageVersion: | - |
| SubsystemVersion: | 5.2 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 8 | "C:\Users\admin\AppData\Local\Temp\CHROME_SETUP\Installer.exe" | C:\Users\admin\AppData\Local\Temp\CHROME_SETUP\Installer.exe | powershell.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 320 | C:\WINDOWS\system32\svchost.exe -k DcomLaunch -p -s LSM | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 684 | winlogon.exe | C:\Windows\System32\winlogon.exe | — | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Logon Application Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 768 | C:\WINDOWS\system32\lsass.exe | C:\Windows\System32\lsass.exe | wininit.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Local Security Authority Process Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 836 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 844 | C:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding | C:\Windows\System32\oobe\UserOOBEBroker.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: User OOBE Broker Version: 10.0.19041.3758 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 852 | "dwm.exe" | C:\Windows\System32\dwm.exe | winlogon.exe | ||||||||||||
User: DWM-1 Company: Microsoft Corporation Integrity Level: SYSTEM Description: Desktop Window Manager Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 904 | C:\WINDOWS\system32\sc.exe stop UsoSvc | C:\Windows\System32\sc.exe | — | Installer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Service Control Manager Configuration Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1004 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powercfg.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1028 | C:\WINDOWS\system32\ApplicationFrameHost.exe -Embedding | C:\Windows\System32\ApplicationFrameHost.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Application Frame Host Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (3760) svchost.exe | Key: | HKEY_USERS\.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18 |
| Operation: | write | Name: | DeviceLicenseUpdateFailureCount |
Value: 0 | |||
| (PID) Process: | (3760) svchost.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL |
| Operation: | write | Name: | GlobalDeviceUpdateTime |
Value: 8A9A856600000000 | |||
| (PID) Process: | (3760) svchost.exe | Key: | HKEY_USERS\.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02lsvnbxpyfjdfiq |
| Operation: | write | Name: | DeviceId |
Value: <Data LastUpdatedTime="1720031882"><User username="02LSVNBXPYFJDFIQ"/></Data>
| |||
| (PID) Process: | (3760) svchost.exe | Key: | HKEY_USERS\.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02lsvnbxpyfjdfiq |
| Operation: | write | Name: | DeviceId |
Value: <Data LastUpdatedTime="1720031882"><User username="02LSVNBXPYFJDFIQ"><HardwareInfo BoundTime="1720031882" TpmKeyStateClient="1" TpmKeyStateServer="3" LicenseKeySequence="1" LicenseInstallError="0" LicenseKeyVersion="2"/></User></Data>
| |||
| (PID) Process: | (3760) svchost.exe | Key: | HKEY_USERS\.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\Logs\02lsvnbxpyfjdfiq |
| Operation: | write | Name: | Provision Wednesday, July 03, 2024 18:38:02 |
Value: AQAAANCMnd8BFdERjHoAwE/Cl+sBAAAAQ9hgSoMcwEm5GLlP5E0uDAAAAAACAAAAAAAQZgAAAAEAACAAAAC7RwyTOe8x/VRTc8x4sLvuonDPj2Oo5OTf4n7I6ssDcwAAAAAOgAAAAAIAACAAAADg9v+T3pCE2IBHm14NhEBiVMn1mPKmtAh5xmblJFFpciAAAAAHEfDmDyP/6HxG3Cek9St+jA/M77ScNFVObHw0mJLMyEAAAAD+fyuXVu79SQQaOBF3UNi0R1hsKmLfufBm7Bb4wjVJNys+9sPWiL25Yw230MB+b6fjWKoxM6nvJH3nCAVqLNB8 | |||
| (PID) Process: | (3760) svchost.exe | Key: | HKEY_USERS\.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18 |
| Operation: | write | Name: | ValidDeviceId |
Value: 02lsvnbxpyfjdfiq | |||
| (PID) Process: | (3760) svchost.exe | Key: | HKEY_USERS\.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02lsvnbxpyfjdfiq |
| Operation: | write | Name: | AppIdList |
Value: {AFDA72BF-3409-413A-B54E-2AB8D66A7826}; | |||
| (PID) Process: | (5588) svchost.exe | Key: | HKEY_USERS\S-1-5-21-1693682860-607145093-2874071422-1001\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Store |
| Operation: | write | Name: | C:\Users\admin\AppData\Local\Temp\18f456bc4bc4f55266f7456bfabe1f343560b6a59a3f5a68e995a34c0563a760.exe |
Value: 534143500100000000000000070000002800000002F804010000000001000000000000000000000A0021000050BB64EDDDACD5010000000000000000 | |||
| (PID) Process: | (1312) svchost.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{C660D735-E9F2-4190-9B4E-97ADF1AFFA16} |
| Operation: | write | Name: | DynamicInfo |
Value: 030000003B22B524AAB7D801EBFFC02278CDDA01000000000000000037456919B92DDA01 | |||
| (PID) Process: | (1312) svchost.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{C660D735-E9F2-4190-9B4E-97ADF1AFFA16} |
| Operation: | write | Name: | DynamicInfo |
Value: 030000003B22B524AAB7D801EBFFC02278CDDA01000000000000000025F96E2378CDDA01 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 768 | lsass.exe | C:\WINDOWS\system32\Microsoft\Protect\S-1-5-18\User\4a60d843-1c83-49c0-b918-b94fe44d2e0c | binary | |
MD5:49B72031BCE941FA17EFCEC6B534F14C | SHA256:2E4D4D134361252AFAC131CBEDE3CBC4D106732C35974BE7BF7903AA0D1BBF0A | |||
| 6824 | 18f456bc4bc4f55266f7456bfabe1f343560b6a59a3f5a68e995a34c0563a760.exe | C:\Users\admin\AppData\Local\Temp\CHROME_SETUP\Installer.exe | executable | |
MD5:E760E50CC4CB2488FD59A59A064EE1B1 | SHA256:8F4C6D8591E9A44782191CEB7BC031F710E9D5E03BDF3353AA080BB58474CF2D | |||
| 6824 | 18f456bc4bc4f55266f7456bfabe1f343560b6a59a3f5a68e995a34c0563a760.exe | C:\Users\admin\AppData\Local\Temp\CHROME_SETUP\4356897439864370634.exe | executable | |
MD5:5EA30ED7A18CB503C64C9589F415015A | SHA256:1C0C5AABFD797FD5978DF8E5B992946F6F3099B987629C20E77F3EF581579C65 | |||
| 4612 | explorer.exe | C:\Users\admin\AppData\Local\Microsoft\PenWorkspace\DiscoverCacheData.dat | binary | |
MD5:E49C56350AEDF784BFE00E444B879672 | SHA256:A8BD235303668981563DFB5AAE338CB802817C4060E2C199B7C84901D57B7E1E | |||
| 768 | lsass.exe | C:\WINDOWS\system32\Microsoft\Protect\S-1-5-18\User\Preferred | binary | |
MD5:F2F41B65EADFD141E4C4FC550A01BA4F | SHA256:75F693FCC763E26423BCE63BB518190FC53B01380CB24FACF8C4CFB863B0AE3F | |||
| 3040 | OfficeClickToRun.exe | C:\WINDOWS\system32\config\systemprofile\AppData\Local\Microsoft\Office\16.0\officeclicktorun.exe_Rules.xml | xml | |
MD5:7B8AE1247CA7D14E92668BA5C2D3A0A3 | SHA256:E6CCBC3BBA0CE0A1255545C31F6154274614722402050F58A481EDF485ECAC96 | |||
| 6384 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\Temp\WER801.tmp.dmp | dmp | |
MD5:3016858FC61882B8CF5BABC23A6F4717 | SHA256:0C9D95C11BE53B3B085C0DFB805F4E079CD6EA31EACA0508AC87025952080DD4 | |||
| 1608 | svchost.exe | C:\Windows\Prefetch\HOST.EXE-F5D74C61.pf | binary | |
MD5:1500E846A1E24096619CBEDAFE3C3E14 | SHA256:6640FBBFF7CFC68FD726AA7AA837A6E1C4113D42B8590138F38F33893F4524A3 | |||
| 7068 | svchost.exe | C:\ProgramData\Microsoft\Windows\WER\Temp\WERA54.tmp.txt | binary | |
MD5:55388E18105FCE6F64D599C872913954 | SHA256:4B7E491A2F7052F293E8BA0ADDBF5875B6696963362E7ED830AFE9279C10C9DE | |||
| 7068 | svchost.exe | C:\ProgramData\Microsoft\Windows\WER\Temp\WERA24.tmp.csv | binary | |
MD5:36B10DE39F19229FE6A03548D9CE959E | SHA256:647E2286D5B3E88ADCF2362D251714988FC24DCBE202AD520AEAAE6CE538D451 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
900 | backgroundTaskHost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D | unknown | — | — | unknown |
6384 | WerFault.exe | GET | 200 | 23.48.23.166:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | unknown |
7804 | SIHClient.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | unknown |
5328 | dialer.exe | POST | 200 | 31.31.198.99:80 | http://panelslk.pro/api/endpoint.php | unknown | — | — | unknown |
3040 | OfficeClickToRun.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D | unknown | — | — | unknown |
5328 | dialer.exe | POST | 200 | 31.31.198.99:80 | http://panelslk.pro/api/endpoint.php | unknown | — | — | unknown |
6384 | WerFault.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | unknown |
2416 | backgroundTaskHost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D | unknown | — | — | unknown |
7804 | SIHClient.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4032 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
3040 | OfficeClickToRun.exe | 52.111.227.14:443 | nexusrules.officeapps.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | unknown |
3760 | svchost.exe | 20.190.159.75:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
1060 | svchost.exe | 23.35.238.131:443 | go.microsoft.com | AKAMAI-AS | DE | unknown |
1928 | svchost.exe | 4.231.128.59:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
5328 | RUXIMICS.exe | 4.231.128.59:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 20.190.159.75:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
6004 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
2760 | svchost.exe | 40.113.103.199:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
1928 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
Domain | IP | Reputation |
|---|---|---|
nexusrules.officeapps.live.com |
| whitelisted |
go.microsoft.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
arc.msn.com |
| whitelisted |
watson.events.data.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
fd.api.iris.microsoft.com |
| whitelisted |
api.ip.sb |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
7060 | RegAsm.exe | Misc Attack | ET DROP Spamhaus DROP Listed Traffic Inbound group 15 |
7060 | RegAsm.exe | Malware Command and Control Activity Detected | STEALER [ANY.RUN] MetaStealer v.5 TLS Connection |
7060 | RegAsm.exe | Malware Command and Control Activity Detected | STEALER [ANY.RUN] MetaStealer v.5 TLS Certificate |
5328 | dialer.exe | Potential Corporate Privacy Violation | ET POLICY Cryptocurrency Miner Checkin |
2168 | svchost.exe | Crypto Currency Mining Activity Detected | ET COINMINER CoinMiner Domain in DNS Lookup (pool .hashvault .pro) |
5328 | dialer.exe | Crypto Currency Mining Activity Detected | ET MALWARE [ANY.RUN] SilentCryptoMiner Check-in POST Request |
5328 | dialer.exe | Crypto Currency Mining Activity Detected | MINER [ANY.RUN] SilentCryptoMiner HTTP Request to UnamWebPanel |
5328 | dialer.exe | Crypto Currency Mining Activity Detected | ET MALWARE [ANY.RUN] SilentCryptoMiner Check-in POST Request |
5328 | dialer.exe | Crypto Currency Mining Activity Detected | MINER [ANY.RUN] SilentCryptoMiner HTTP Request to UnamWebPanel |
5328 | dialer.exe | Potential Corporate Privacy Violation | ET POLICY Cryptocurrency Miner Checkin |