Analysis
-
max time kernel
139s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
23-09-2023 18:45
Behavioral task
behavioral1
Sample
SPYGAME.bin.exe
Resource
win7-20230831-en
General
-
Target
SPYGAME.bin.exe
-
Size
274KB
-
MD5
e94364b4239eb39286dd3b07a9ea469c
-
SHA1
95a3fc71b5a4f63e1ce10c163af55b56f168a6f8
-
SHA256
c2ade6498bf4fe3991c76104a2d5a8ad880ab4baaf0756f707eb3b22d9734a8f
-
SHA512
bb924f1c1f8b851c70d5639abed43ed047452bac62580d060229e7a054d5f1be269e2888a3dfe511b434ac5a785dcf37216c95cffd8baaa9432cd930670acc13
-
SSDEEP
6144:8f+BLtABPDWlR1ZroWT0Ilb5wqlYeJ6lA1D0wIk:RluK0Ilb5/lYed1DMk
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1101119692103491584/GTMNvMSwfNfgMdtSqTcvjCvj1QDXJYPNxW9vEtgHszOELGeSAQDBrIp9Qf7oWif26BJd
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 15 freegeoip.app 16 freegeoip.app -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 SPYGAME.bin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier SPYGAME.bin.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2232 SPYGAME.bin.exe 2232 SPYGAME.bin.exe 2232 SPYGAME.bin.exe 2232 SPYGAME.bin.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2232 SPYGAME.bin.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5479a5995f2b8c84166aa1e58c5888695
SHA176bf2bd163b056300666df7056c1cac65be7895c
SHA2562728bae500cbbb5ce303c9d4f086f2be49e30bf1f2d2e1e12efd0c62e9a8caec
SHA512f3f68af793087e2f16cb4e3afd20c47bebcb12ee072b15e8d25dee2840b36aaf1c7540147faa54e8d77cbea40ac292dbb3225ef03e3c98401d0a4257c3c4a823
-
Filesize
1KB
MD54379724b973cfb8dfd1cbe2e21adb7d4
SHA184d5f6bd0c14f88f0dab4761fb4f9799789d3692
SHA2560673ed2dc5e78db12504dee1ffddbceb862983b3fb267e145f46afc5394fbe80
SHA512e173557abc684b5d13e2fe4a45f9a53786a34bf67177b02d65901439b1cae5f8a0047ee4ef708e70a319c9fc141505472277e41064d37380a7f34055c219f4e9
-
Filesize
182B
MD5807b2f5818d37a517a0cd5f4b83a5c47
SHA1a939d8d7e3b9413904a74cda354c511ef70eaab1
SHA256cdc35c670f89496030043b15af32017f089a43764b3cb5bd294fdefacd417190
SHA51266921860ce7611a9fd527c4bef3244ab9b894c1b86a23a11c0064ab96923f1f6017e44cadbc3ca2c4d99f48e659d4fb9eea34ca8d67f3e9461945743430fd803
-
Filesize
528B
MD5a2d8fb5b6be47d98e18c272d4f3e4d6d
SHA14a73cb673286e5e470676b84d6db85c23f491b8b
SHA256bfde035301fbb06d446efbe9e1cbf60badf9009a75161937913be73bdaaa563d
SHA512c42a976f916602dd1ac6af95551e5ea2b6d04cd5cf2c19c16befbdf3bf2b2d6e06e61547c5ccac7a81d780ae493b5c16606ab5955bb89a1d04034e67f2358785
-
Filesize
558B
MD579e10f252d1afbc6c489846e8f31e47f
SHA134b253be5ac39bc3fa613d4612ee9a0be54912b5
SHA256dd644b1bd80da0eab074f2bb0e0c7092a77482cb182c1ce2f91a3829c56f1d24
SHA5122386b2b809b180bcc6d2aa2420fea8ef372a03c69ffe938c8c2e8d99f86800c79ca8dc7e6c0934c87b430184d4abd50086ab74c78052ff672f218cf0b9b3aafa
-
Filesize
1KB
MD5bf0001be1b01b49d3ecf4fbec4cb26eb
SHA15044ad181e0b278e0ce02f0848df2b6ba1a5b8d7
SHA256cd8808fbde2cf70fd1683988af42ab228462d816c9e1d212fcad9138283af450
SHA5122233ac9eeac12e63f348bab614deb63490440fb71f1918eaba59500d43430aed9ea2aee2feb8e68efc8231bfa159af05abbc8b58d0a27437d0e68021bf647a32