Analysis

  • max time kernel
    4294181s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20220223-en
  • submitted
    01-03-2022 18:12

General

  • Target

    b05617170e474f6689b3c8bbf653e48b3b335d9924140f891a44327fe10cec8b.exe

  • Size

    274KB

  • MD5

    1774b03fe04c0912378903346f6d807a

  • SHA1

    33fbaeeb05bfe3e985af80a4f400dbc236fa51bd

  • SHA256

    b05617170e474f6689b3c8bbf653e48b3b335d9924140f891a44327fe10cec8b

  • SHA512

    8a76d27bc58ccc481bbdaa726483bf84b8a5c3e6512b6259a26b64fffea697900edc1efe5405c9b6a6ac61fbcc8bc0653b506692dde7f1c1251692595bd4aec0

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/943405830781427732/bWrTiH0DBogSkJQzwQGoq_flifTRESk2r9Ezawioxg9zPGU0YKxSBP93A3sfQaAMshgX

Signatures

  • 44Caliber

    An open source infostealer written in C#.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b05617170e474f6689b3c8bbf653e48b3b335d9924140f891a44327fe10cec8b.exe
    "C:\Users\Admin\AppData\Local\Temp\b05617170e474f6689b3c8bbf653e48b3b335d9924140f891a44327fe10cec8b.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2036

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2036-54-0x00000000001A0000-0x00000000001EA000-memory.dmp

    Filesize

    296KB

  • memory/2036-55-0x000007FEF5263000-0x000007FEF5264000-memory.dmp

    Filesize

    4KB

  • memory/2036-56-0x000000001B100000-0x000000001B102000-memory.dmp

    Filesize

    8KB