Analysis
-
max time kernel
119s -
max time network
126s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
01-03-2022 18:12
Static task
static1
Behavioral task
behavioral1
Sample
9a07408e7914dbaac53d23756d2471b9e6a781d993cbe34a61b6dbb50651c2e8.exe
Resource
win7-en-20211208
General
-
Target
9a07408e7914dbaac53d23756d2471b9e6a781d993cbe34a61b6dbb50651c2e8.exe
-
Size
274KB
-
MD5
8dbfe1b50dc3a2270110201d54adff0a
-
SHA1
71504492a77bb56acfdb35008d667d51d2b43c7e
-
SHA256
9a07408e7914dbaac53d23756d2471b9e6a781d993cbe34a61b6dbb50651c2e8
-
SHA512
864ea5f844723c12d506e1704dc3331131ffb702df9e6bfa555af18d9b536affe39465e3b0ddf7c28bac27d0e0f54e3672d316a5e341bf2549bb78fdf6aa0a9a
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/940311939115016313/WAo7Di7NoH_OzgcUfYlj6OV8WmrOYG24yfbOy1uT8znuGIEPOhhcWIgtRBfqinwZXSt5
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 freegeoip.app -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
9a07408e7914dbaac53d23756d2471b9e6a781d993cbe34a61b6dbb50651c2e8.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 9a07408e7914dbaac53d23756d2471b9e6a781d993cbe34a61b6dbb50651c2e8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 9a07408e7914dbaac53d23756d2471b9e6a781d993cbe34a61b6dbb50651c2e8.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
9a07408e7914dbaac53d23756d2471b9e6a781d993cbe34a61b6dbb50651c2e8.exepid process 1632 9a07408e7914dbaac53d23756d2471b9e6a781d993cbe34a61b6dbb50651c2e8.exe 1632 9a07408e7914dbaac53d23756d2471b9e6a781d993cbe34a61b6dbb50651c2e8.exe 1632 9a07408e7914dbaac53d23756d2471b9e6a781d993cbe34a61b6dbb50651c2e8.exe 1632 9a07408e7914dbaac53d23756d2471b9e6a781d993cbe34a61b6dbb50651c2e8.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
9a07408e7914dbaac53d23756d2471b9e6a781d993cbe34a61b6dbb50651c2e8.exedescription pid process Token: SeDebugPrivilege 1632 9a07408e7914dbaac53d23756d2471b9e6a781d993cbe34a61b6dbb50651c2e8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a07408e7914dbaac53d23756d2471b9e6a781d993cbe34a61b6dbb50651c2e8.exe"C:\Users\Admin\AppData\Local\Temp\9a07408e7914dbaac53d23756d2471b9e6a781d993cbe34a61b6dbb50651c2e8.exe"1⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1632