Analysis
-
max time kernel
140s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20220722-en -
resource tags
arch:x64arch:x86image:win10v2004-20220722-enlocale:en-usos:windows10-2004-x64system -
submitted
05-08-2022 11:20
Behavioral task
behavioral1
Sample
hyperbone.exe
Resource
win7-20220718-en
General
-
Target
hyperbone.exe
-
Size
274KB
-
MD5
a7032dd7f36c5956e63c59963bdf4739
-
SHA1
2ea9b54e931c2dc3ac4abcf78af4d7d36727c8bf
-
SHA256
1b2b0f61bfd22c8c19a7fb3a1597966c690bc1c5c57ec7a6b9d8a9aeaa1bc5f9
-
SHA512
ce08b2404784aa8649e2d4a557d6e88105deb63d8f3a432209979368bcd69d93150658519efa348731b80524a8e18dc04a17d15b6688dff153a50cf131ee37a8
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/999704329843920927/nMJWFTtRMui1F-sfFrddoo689md-24vX0sQiTDlFgvG9FYl3vQXGKIHbQ6xddFlWg57E
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 11 freegeoip.app 10 freegeoip.app -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
hyperbone.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 hyperbone.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier hyperbone.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
hyperbone.exepid process 4968 hyperbone.exe 4968 hyperbone.exe 4968 hyperbone.exe 4968 hyperbone.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
hyperbone.exedescription pid process Token: SeDebugPrivilege 4968 hyperbone.exe