Malware Analysis Report

2024-11-15 06:29

Sample ID 220301-wve7xsbah8
Target f3680fe4c64d0581dc68bc1116798864dd9e361d7d50729e2d89844a58d1cd58.bin
SHA256 f3680fe4c64d0581dc68bc1116798864dd9e361d7d50729e2d89844a58d1cd58
Tags
44caliber
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

f3680fe4c64d0581dc68bc1116798864dd9e361d7d50729e2d89844a58d1cd58

Threat Level: Shows suspicious behavior

The file f3680fe4c64d0581dc68bc1116798864dd9e361d7d50729e2d89844a58d1cd58.bin was found to be: Shows suspicious behavior.

Malicious Activity Summary

44caliber

44caliber family

Drops startup file

Enumerates physical storage devices

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2022-03-03 17:38

Signatures

44caliber family

44caliber

Analysis: behavioral1

Detonation Overview

Submitted

2022-03-01 18:14

Reported

2022-03-01 18:18

Platform

win7-20220223-en

Max time kernel

4294182s

Max time network

125s

Command Line

"C:\Users\Admin\AppData\Local\Temp\f3680fe4c64d0581dc68bc1116798864dd9e361d7d50729e2d89844a58d1cd58.exe"

Signatures

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Sutup-Filer.exe.lnk C:\Users\Admin\AppData\Local\Temp\f3680fe4c64d0581dc68bc1116798864dd9e361d7d50729e2d89844a58d1cd58.exe N/A

Enumerates physical storage devices

Processes

C:\Users\Admin\AppData\Local\Temp\f3680fe4c64d0581dc68bc1116798864dd9e361d7d50729e2d89844a58d1cd58.exe

"C:\Users\Admin\AppData\Local\Temp\f3680fe4c64d0581dc68bc1116798864dd9e361d7d50729e2d89844a58d1cd58.exe"

Network

N/A

Files

memory/1932-54-0x00000000759B1000-0x00000000759B3000-memory.dmp

memory/1932-55-0x00000000009E0000-0x00000000009E1000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2022-03-01 18:14

Reported

2022-03-01 18:18

Platform

win10v2004-en-20220113

Max time kernel

129s

Max time network

133s

Command Line

"C:\Users\Admin\AppData\Local\Temp\f3680fe4c64d0581dc68bc1116798864dd9e361d7d50729e2d89844a58d1cd58.exe"

Signatures

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Sutup-Filer.exe.lnk C:\Users\Admin\AppData\Local\Temp\f3680fe4c64d0581dc68bc1116798864dd9e361d7d50729e2d89844a58d1cd58.exe N/A

Enumerates physical storage devices

Processes

C:\Users\Admin\AppData\Local\Temp\f3680fe4c64d0581dc68bc1116798864dd9e361d7d50729e2d89844a58d1cd58.exe

"C:\Users\Admin\AppData\Local\Temp\f3680fe4c64d0581dc68bc1116798864dd9e361d7d50729e2d89844a58d1cd58.exe"

Network

Country Destination Domain Proto
US 72.21.81.240:80 tcp
US 72.21.81.240:80 tcp
NL 84.53.175.107:80 tcp

Files

N/A