Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
17-09-2023 12:41
Behavioral task
behavioral1
Sample
interium_crack.exe
Resource
win7-20230831-en
General
-
Target
interium_crack.exe
-
Size
274KB
-
MD5
7304d91a9b1a9aa8b85e3922c134c1fc
-
SHA1
fda49f2c05e7446d7b40246d6346782ff4ca8250
-
SHA256
90da0f65e1b0635663ac57db702127175c8400f7db5dd1384a4346b4d76f279f
-
SHA512
6ca6b4dee184faa10e43f678bec5131ef05833979d1a0bee7a6c87cd9a5add9c1857f2e9d97d9e2e5bcb69eaf73fa938f6ec2f765ae70bd90dcd53165a7521bc
-
SSDEEP
6144:4f+BLtABPDj0LF5jsP78dEEoIrceRsMsmZ0MI1e0C7L:c0PjfSEoIrVk1ejL
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1151153702359535737/SNgzUJ16Y9V-Kp27Hyby1d0TAb5FgALa9RCHRaKLGuk5MliboFTb9Cg-KDoL2MAYQLOp
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 1 freegeoip.app 2 freegeoip.app -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
interium_crack.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 interium_crack.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier interium_crack.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
interium_crack.exepid process 4296 interium_crack.exe 4296 interium_crack.exe 4296 interium_crack.exe 4296 interium_crack.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
interium_crack.exedescription pid process Token: SeDebugPrivilege 4296 interium_crack.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f39783d3a0ce02c9d4446b3791ecd351
SHA160520e868b53d0446f5d2be9206d87530f62532c
SHA2561af8187fb4d9cb81df75b5059a7ee90bbcaedd13d01731f4e932ba27587e579e
SHA5128def800310632b5914da4eb05e978cd81eccd11ad639e33cd64f2940a793eca8439308a2f0af4f6b74d43b34b4cdf77f102795f9e20e56b44d1fe36fc10fbfae
-
Filesize
1KB
MD5f39783d3a0ce02c9d4446b3791ecd351
SHA160520e868b53d0446f5d2be9206d87530f62532c
SHA2561af8187fb4d9cb81df75b5059a7ee90bbcaedd13d01731f4e932ba27587e579e
SHA5128def800310632b5914da4eb05e978cd81eccd11ad639e33cd64f2940a793eca8439308a2f0af4f6b74d43b34b4cdf77f102795f9e20e56b44d1fe36fc10fbfae