Analysis
-
max time kernel
4294106s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
11-03-2022 15:30
Static task
static1
Behavioral task
behavioral1
Sample
ExternalRun.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
ExternalRun.exe
Resource
win10v2004-20220310-en
General
-
Target
ExternalRun.exe
-
Size
274KB
-
MD5
63525b6ba838d80f0eb16a666ff30de2
-
SHA1
b11d70bf65b2b82df2c4aa46ac9dfce3c308b568
-
SHA256
3c8acfa90eed5ab18fd669bea9d494d9fb96f964d9040ee03ff9889dbaada294
-
SHA512
0709a2bb5d23ede0347e684a6512f0c282de68e3e7f1800ea1544e2f737cd77333bb0a496f6a0489d32df60e7d37760225e1fcac8d9905ae1b84d3de8ee348eb
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/947512216133980311/ImHpeYlo_A0Yhi0saM66pMBO7iLHhGK_k5MBohq8Jg4tn4gMe7dTpw1qEItYNQR_c9kp
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1604-54-0x0000000001380000-0x00000000013CA000-memory.dmp Discord_wb -
Processes:
resource yara_rule behavioral1/memory/1604-54-0x0000000001380000-0x00000000013CA000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 freegeoip.app 5 freegeoip.app -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
ExternalRun.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 ExternalRun.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier ExternalRun.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
ExternalRun.exepid process 1604 ExternalRun.exe 1604 ExternalRun.exe 1604 ExternalRun.exe 1604 ExternalRun.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
ExternalRun.exedescription pid process Token: SeDebugPrivilege 1604 ExternalRun.exe