Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    13-09-2023 08:59

General

  • Target

    a011238f838b9bc61adec2897e0cac87099249a425dbc83064094fbdb987f337.exe

  • Size

    415KB

  • MD5

    f3f3c591de1ed8ea2c00dcf8c03b86bf

  • SHA1

    02e9dee6e17a41b74054d11a2f0e7abc0b963b12

  • SHA256

    a011238f838b9bc61adec2897e0cac87099249a425dbc83064094fbdb987f337

  • SHA512

    61b2a9d6c011babe0540db4016627a584161c7fac432820424cd8c85cd85cb1ca537e1b202cceec241b99592865ace30cf9f47362563b82250053dfb63abb214

  • SSDEEP

    6144:2TouKrWBEu3/Z2lpGDHU3ykJotX+t41/5c8gWe3JB2AgMmqP:2ToPWBv/cpGrU3yVtX+t4V5cWe5A+mqP

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/1136773243261427722/PblfbxA7GVJqBDdmJ8FJrCPSUvE8iRRElfnrMu-WTqPYsrO633tdDs3xiZCowAI13ArQ

Signatures

  • 44Caliber

    An open source infostealer written in C#.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a011238f838b9bc61adec2897e0cac87099249a425dbc83064094fbdb987f337.exe
    "C:\Users\Admin\AppData\Local\Temp\a011238f838b9bc61adec2897e0cac87099249a425dbc83064094fbdb987f337.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2912
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\loader.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\loader.exe"
      2⤵
      • Executes dropped EXE
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\44\Process.txt

    Filesize

    458B

    MD5

    a44b9665bf618f148fabef94a48309e3

    SHA1

    4f34277912c94b88bd82c85b92bf8bff5c11aef3

    SHA256

    5e2058751c623d55b0444b06544bee16b12bc3dbd7f9215113396e3a4e5a861a

    SHA512

    6a4f829d46b2c56ce7e1d2ef59e5a2edeecbedc4777224c2f91d50f1f8d2374180af0e8a351cf3bb7d020257a0f5562582025c2fa4b26b9171f5a37dcd74140e

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\loader.exe

    Filesize

    274KB

    MD5

    85b10f8d022b2b82aa276168da0950fe

    SHA1

    f0ebbadf43bd9fbd5f93706aae076f89230a643b

    SHA256

    fd45e5b2e40a6a427bc0b2caf7d546a63a632adaa4fe7cb70a9173f74c4c54e2

    SHA512

    737fccf654e342818da06adfbfa724862d5c816551e110cf94f71313186b8dc19319dcbb26affe47a9a0f7c05ecaaa564d95d1a6a2fd7c6278bddaef9347c53b

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\loader.exe

    Filesize

    274KB

    MD5

    85b10f8d022b2b82aa276168da0950fe

    SHA1

    f0ebbadf43bd9fbd5f93706aae076f89230a643b

    SHA256

    fd45e5b2e40a6a427bc0b2caf7d546a63a632adaa4fe7cb70a9173f74c4c54e2

    SHA512

    737fccf654e342818da06adfbfa724862d5c816551e110cf94f71313186b8dc19319dcbb26affe47a9a0f7c05ecaaa564d95d1a6a2fd7c6278bddaef9347c53b

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\loader.exe

    Filesize

    274KB

    MD5

    85b10f8d022b2b82aa276168da0950fe

    SHA1

    f0ebbadf43bd9fbd5f93706aae076f89230a643b

    SHA256

    fd45e5b2e40a6a427bc0b2caf7d546a63a632adaa4fe7cb70a9173f74c4c54e2

    SHA512

    737fccf654e342818da06adfbfa724862d5c816551e110cf94f71313186b8dc19319dcbb26affe47a9a0f7c05ecaaa564d95d1a6a2fd7c6278bddaef9347c53b

  • \Users\Admin\AppData\Local\Temp\RarSFX0\loader.exe

    Filesize

    274KB

    MD5

    85b10f8d022b2b82aa276168da0950fe

    SHA1

    f0ebbadf43bd9fbd5f93706aae076f89230a643b

    SHA256

    fd45e5b2e40a6a427bc0b2caf7d546a63a632adaa4fe7cb70a9173f74c4c54e2

    SHA512

    737fccf654e342818da06adfbfa724862d5c816551e110cf94f71313186b8dc19319dcbb26affe47a9a0f7c05ecaaa564d95d1a6a2fd7c6278bddaef9347c53b

  • \Users\Admin\AppData\Local\Temp\RarSFX0\loader.exe

    Filesize

    274KB

    MD5

    85b10f8d022b2b82aa276168da0950fe

    SHA1

    f0ebbadf43bd9fbd5f93706aae076f89230a643b

    SHA256

    fd45e5b2e40a6a427bc0b2caf7d546a63a632adaa4fe7cb70a9173f74c4c54e2

    SHA512

    737fccf654e342818da06adfbfa724862d5c816551e110cf94f71313186b8dc19319dcbb26affe47a9a0f7c05ecaaa564d95d1a6a2fd7c6278bddaef9347c53b

  • \Users\Admin\AppData\Local\Temp\RarSFX0\loader.exe

    Filesize

    274KB

    MD5

    85b10f8d022b2b82aa276168da0950fe

    SHA1

    f0ebbadf43bd9fbd5f93706aae076f89230a643b

    SHA256

    fd45e5b2e40a6a427bc0b2caf7d546a63a632adaa4fe7cb70a9173f74c4c54e2

    SHA512

    737fccf654e342818da06adfbfa724862d5c816551e110cf94f71313186b8dc19319dcbb26affe47a9a0f7c05ecaaa564d95d1a6a2fd7c6278bddaef9347c53b

  • \Users\Admin\AppData\Local\Temp\RarSFX0\loader.exe

    Filesize

    274KB

    MD5

    85b10f8d022b2b82aa276168da0950fe

    SHA1

    f0ebbadf43bd9fbd5f93706aae076f89230a643b

    SHA256

    fd45e5b2e40a6a427bc0b2caf7d546a63a632adaa4fe7cb70a9173f74c4c54e2

    SHA512

    737fccf654e342818da06adfbfa724862d5c816551e110cf94f71313186b8dc19319dcbb26affe47a9a0f7c05ecaaa564d95d1a6a2fd7c6278bddaef9347c53b

  • memory/2984-15-0x0000000000B40000-0x0000000000B8A000-memory.dmp

    Filesize

    296KB

  • memory/2984-16-0x000007FEF63B0000-0x000007FEF6D9C000-memory.dmp

    Filesize

    9.9MB

  • memory/2984-17-0x000000001A8A0000-0x000000001A920000-memory.dmp

    Filesize

    512KB

  • memory/2984-66-0x000007FEF63B0000-0x000007FEF6D9C000-memory.dmp

    Filesize

    9.9MB