File name:

321123123.exe

Full analysis: https://app.any.run/tasks/d0f1a3e1-b25b-4bfe-95d8-9767b4d46409
Verdict: Malicious activity
Threats:

Meduza Stealer is an information-stealing malware primarily targeting Windows systems, designed to harvest sensitive data such as login credentials, browsing histories, cookies, cryptocurrency wallets, and password manager data. It has advanced anti-detection mechanisms, allowing it to evade many antivirus programs. The malware is distributed through various means, including phishing emails and malicious links. It’s marketed on underground forums and Telegram channels.

Analysis date: December 14, 2024, 12:12:35
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
meduza
stealer
exfiltration
evasion
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 10 sections
MD5:

8EDFF3F58DF24723F285AA113BA3DA4B

SHA1:

D9FFC44BEAB78FCF6910E6A55D9B888183967E05

SHA256:

82C1101855ADFF990A1A5E6DCF6BDC32103088007B1F5F1EA52D8E765FBB3AD3

SSDEEP:

24576:rxIkpMmC/omqvmsbDHBKp7x4zJ85i2IzVbAe1uPai0IQ9h2DueYkIyPvLRssAcNi:rxIkpuwR/qaqwJAQiaTVWPPvysAhp

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • MEDUZASTEALER has been detected (SURICATA)

      • 321123123.exe (PID: 6632)
    • Stealers network behavior

      • 321123123.exe (PID: 6632)
    • Starts CMD.EXE for self-deleting

      • 321123123.exe (PID: 6632)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • 321123123.exe (PID: 6632)
    • Application launched itself

      • 321123123.exe (PID: 6260)
      • 321123123.exe (PID: 6612)
    • Searches for installed software

      • 321123123.exe (PID: 6632)
    • Checks for external IP

      • 321123123.exe (PID: 6632)
    • The process connected to a server suspected of theft

      • 321123123.exe (PID: 6632)
    • Connects to unusual port

      • 321123123.exe (PID: 6632)
    • Starts CMD.EXE for commands execution

      • 321123123.exe (PID: 6632)
    • Reads the date of Windows installation

      • 321123123.exe (PID: 6632)
    • Hides command output

      • cmd.exe (PID: 4136)
    • Runs PING.EXE to delay simulation

      • cmd.exe (PID: 4136)
    • Checks Windows Trust Settings

      • 321123123.exe (PID: 6632)
  • INFO

    • Reads security settings of Internet Explorer

      • dllhost.exe (PID: 6556)
    • Reads the machine GUID from the registry

      • 321123123.exe (PID: 6288)
      • 321123123.exe (PID: 6632)
    • Process checks computer location settings

      • 321123123.exe (PID: 6632)
    • Checks proxy server information

      • 321123123.exe (PID: 6632)
    • Creates files or folders in the user directory

      • 321123123.exe (PID: 6632)
    • Checks supported languages

      • 321123123.exe (PID: 6260)
      • 321123123.exe (PID: 6612)
      • 321123123.exe (PID: 6632)
      • 321123123.exe (PID: 6288)
    • Reads the time zone

      • 321123123.exe (PID: 6632)
    • The process uses the downloaded file

      • 321123123.exe (PID: 6632)
    • Reads product name

      • 321123123.exe (PID: 6632)
    • Checks transactions between databases Windows and Oracle

      • 321123123.exe (PID: 6288)
    • Reads the software policy settings

      • 321123123.exe (PID: 6632)
    • Reads the computer name

      • 321123123.exe (PID: 6632)
      • 321123123.exe (PID: 6288)
    • Reads Environment values

      • 321123123.exe (PID: 6632)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic Win/DOS Executable (50)
.exe | DOS Executable Generic (49.9)

EXIF

EXE

Subsystem: Windows GUI
SubsystemVersion: 6
ImageVersion: -
OSVersion: 6
EntryPoint: 0x4e10
UninitializedDataSize: -
InitializedDataSize: 3202048
CodeSize: 72192
LinkerVersion: 14
PEType: PE32+
ImageFileCharacteristics: Executable, Large address aware
TimeStamp: 2024:12:10 14:34:19+00:00
MachineType: AMD AMD64
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
135
Monitored processes
9
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 321123123.exe no specs 321123123.exe no specs CMSTPLUA no specs Color Management no specs 321123123.exe no specs #MEDUZASTEALER 321123123.exe cmd.exe no specs conhost.exe no specs ping.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
6260"C:\Users\admin\AppData\Local\Temp\321123123.exe" C:\Users\admin\AppData\Local\Temp\321123123.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\321123123.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\msvcrt.dll
6288"C:\Users\admin\AppData\Local\Temp\321123123.exe"C:\Users\admin\AppData\Local\Temp\321123123.exe321123123.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
1630
Modules
Images
c:\users\admin\appdata\local\temp\321123123.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\bcrypt.dll
6456C:\WINDOWS\system32\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}C:\Windows\System32\dllhost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
COM Surrogate
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\dllhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
6556C:\WINDOWS\system32\DllHost.exe /Processid:{D2E7041B-2927-42FB-8E9F-7CE93B6DC937}C:\Windows\System32\dllhost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
COM Surrogate
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\dllhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
6612"C:\Users\admin\AppData\Local\Temp\321123123.exe" C:\Users\admin\AppData\Local\Temp\321123123.exedllhost.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\321123123.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\msvcrt.dll
6632"C:\Users\admin\AppData\Local\Temp\321123123.exe"C:\Users\admin\AppData\Local\Temp\321123123.exe
321123123.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\321123123.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
4136"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\admin\AppData\Local\Temp\321123123.exe"C:\Windows\System32\cmd.exe321123123.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\bcrypt.dll
6016\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6304ping 1.1.1.1 -n 1 -w 3000 C:\Windows\System32\PING.EXEcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
TCP/IP Ping Command
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\ping.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\nsi.dll
Total events
2 065
Read events
2 063
Write events
1
Delete events
1

Modification events

(PID) Process:(6456) dllhost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ICM\Calibration
Operation:writeName:DisplayCalibrator
Value:
C:\Users\admin\AppData\Local\Temp\321123123.exe
(PID) Process:(6456) dllhost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ICM\Calibration
Operation:delete valueName:DisplayCalibrator
Value:
C:\Users\admin\AppData\Local\Temp\321123123.exe
Executable files
0
Suspicious files
4
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
6632321123123.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8der
MD5:971C514F84BBA0785F80AA1C23EDFD79
SHA256:F157ED17FCAF8837FA82F8B69973848C9B10A02636848F995698212A08F31895
6632321123123.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12binary
MD5:56AC81D16D97DC7D977E0D1AB8965B63
SHA256:D4E0BFA4822539A149F516CF65F94DCE476AEDC013491EEB56118088747BF856
6632321123123.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12der
MD5:67E486B2F148A3FCA863728242B6273E
SHA256:FACAF1C3A4BF232ABCE19A2D534E495B0D3ADC7DBE3797D336249AA6F70ADCFB
6632321123123.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8binary
MD5:5EA35316F08BEE143FD917F984B50928
SHA256:51BDBA17D73A1D48204122C53856F8C2A1DF89F1FB74B9F2A6612AFC95ADB3FA
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
12
TCP/UDP connections
35
DNS requests
18
Threats
10

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6152
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
6152
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
6632
321123123.exe
GET
200
172.217.18.3:80
http://c.pki.goog/r/gsr1.crl
unknown
whitelisted
3884
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
192.168.100.255:137
whitelisted
4712
MoUsoCoreWorker.exe
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5064
SearchApp.exe
104.126.37.177:443
www.bing.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
6632
321123123.exe
147.45.44.228:15666
OOO FREEnet Group
RU
malicious

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 23.48.23.156
  • 23.48.23.143
whitelisted
www.microsoft.com
  • 184.30.21.171
  • 88.221.169.152
whitelisted
google.com
  • 172.217.18.110
whitelisted
www.bing.com
  • 104.126.37.177
  • 104.126.37.185
  • 104.126.37.155
  • 104.126.37.163
  • 104.126.37.176
  • 104.126.37.179
  • 104.126.37.161
  • 104.126.37.160
  • 104.126.37.178
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
api.ipify.org
  • 104.26.13.205
  • 104.26.12.205
  • 172.67.74.152
shared
c.pki.goog
  • 172.217.18.3
whitelisted
go.microsoft.com
  • 23.218.210.69
whitelisted
login.live.com
  • 20.190.159.71
  • 40.126.31.73
  • 20.190.159.68
  • 40.126.31.67
  • 20.190.159.23
  • 20.190.159.73
  • 20.190.159.75
  • 20.190.159.4
whitelisted

Threats

PID
Process
Class
Message
Misc activity
ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup
Misc activity
ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI
A Network Trojan was detected
ET MALWARE [ANY.RUN] Meduza Stealer Exfiltration M1
Successful Credential Theft Detected
STEALER [ANY.RUN] Meduza Stealer
A Network Trojan was detected
ET MALWARE [ANY.RUN] Possible Meduza Stealer Exfiltration (TCP)
A Network Trojan was detected
ET MALWARE [ANY.RUN] Possible Meduza Stealer Exfiltration (TCP)
A Network Trojan was detected
ET MALWARE [ANY.RUN] Meduza Stealer Exfiltration M1
Successful Credential Theft Detected
STEALER [ANY.RUN] Possible Meduza Stealer Exfiltration (TCP)
Successful Credential Theft Detected
STEALER [ANY.RUN] Meduza Stealer
Successful Credential Theft Detected
STEALER [ANY.RUN] Possible Meduza Stealer Exfiltration (TCP)
No debug info