Analysis

  • max time kernel
    139s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-09-2023 18:45

General

  • Target

    SPYGAME.bin.exe

  • Size

    274KB

  • MD5

    e94364b4239eb39286dd3b07a9ea469c

  • SHA1

    95a3fc71b5a4f63e1ce10c163af55b56f168a6f8

  • SHA256

    c2ade6498bf4fe3991c76104a2d5a8ad880ab4baaf0756f707eb3b22d9734a8f

  • SHA512

    bb924f1c1f8b851c70d5639abed43ed047452bac62580d060229e7a054d5f1be269e2888a3dfe511b434ac5a785dcf37216c95cffd8baaa9432cd930670acc13

  • SSDEEP

    6144:8f+BLtABPDWlR1ZroWT0Ilb5wqlYeJ6lA1D0wIk:RluK0Ilb5/lYed1DMk

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/1101119692103491584/GTMNvMSwfNfgMdtSqTcvjCvj1QDXJYPNxW9vEtgHszOELGeSAQDBrIp9Qf7oWif26BJd

Signatures

  • 44Caliber

    An open source infostealer written in C#.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SPYGAME.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\SPYGAME.bin.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2232

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\44\Process.txt

    Filesize

    1KB

    MD5

    479a5995f2b8c84166aa1e58c5888695

    SHA1

    76bf2bd163b056300666df7056c1cac65be7895c

    SHA256

    2728bae500cbbb5ce303c9d4f086f2be49e30bf1f2d2e1e12efd0c62e9a8caec

    SHA512

    f3f68af793087e2f16cb4e3afd20c47bebcb12ee072b15e8d25dee2840b36aaf1c7540147faa54e8d77cbea40ac292dbb3225ef03e3c98401d0a4257c3c4a823

  • C:\Users\Admin\AppData\Roaming\44\Process.txt

    Filesize

    1KB

    MD5

    4379724b973cfb8dfd1cbe2e21adb7d4

    SHA1

    84d5f6bd0c14f88f0dab4761fb4f9799789d3692

    SHA256

    0673ed2dc5e78db12504dee1ffddbceb862983b3fb267e145f46afc5394fbe80

    SHA512

    e173557abc684b5d13e2fe4a45f9a53786a34bf67177b02d65901439b1cae5f8a0047ee4ef708e70a319c9fc141505472277e41064d37380a7f34055c219f4e9

  • C:\Users\Admin\AppData\Roaming\44\Process.txt

    Filesize

    182B

    MD5

    807b2f5818d37a517a0cd5f4b83a5c47

    SHA1

    a939d8d7e3b9413904a74cda354c511ef70eaab1

    SHA256

    cdc35c670f89496030043b15af32017f089a43764b3cb5bd294fdefacd417190

    SHA512

    66921860ce7611a9fd527c4bef3244ab9b894c1b86a23a11c0064ab96923f1f6017e44cadbc3ca2c4d99f48e659d4fb9eea34ca8d67f3e9461945743430fd803

  • C:\Users\Admin\AppData\Roaming\44\Process.txt

    Filesize

    528B

    MD5

    a2d8fb5b6be47d98e18c272d4f3e4d6d

    SHA1

    4a73cb673286e5e470676b84d6db85c23f491b8b

    SHA256

    bfde035301fbb06d446efbe9e1cbf60badf9009a75161937913be73bdaaa563d

    SHA512

    c42a976f916602dd1ac6af95551e5ea2b6d04cd5cf2c19c16befbdf3bf2b2d6e06e61547c5ccac7a81d780ae493b5c16606ab5955bb89a1d04034e67f2358785

  • C:\Users\Admin\AppData\Roaming\44\Process.txt

    Filesize

    558B

    MD5

    79e10f252d1afbc6c489846e8f31e47f

    SHA1

    34b253be5ac39bc3fa613d4612ee9a0be54912b5

    SHA256

    dd644b1bd80da0eab074f2bb0e0c7092a77482cb182c1ce2f91a3829c56f1d24

    SHA512

    2386b2b809b180bcc6d2aa2420fea8ef372a03c69ffe938c8c2e8d99f86800c79ca8dc7e6c0934c87b430184d4abd50086ab74c78052ff672f218cf0b9b3aafa

  • C:\Users\Admin\AppData\Roaming\44\Process.txt

    Filesize

    1KB

    MD5

    bf0001be1b01b49d3ecf4fbec4cb26eb

    SHA1

    5044ad181e0b278e0ce02f0848df2b6ba1a5b8d7

    SHA256

    cd8808fbde2cf70fd1683988af42ab228462d816c9e1d212fcad9138283af450

    SHA512

    2233ac9eeac12e63f348bab614deb63490440fb71f1918eaba59500d43430aed9ea2aee2feb8e68efc8231bfa159af05abbc8b58d0a27437d0e68021bf647a32

  • memory/2232-0-0x0000027A069B0000-0x0000027A069FA000-memory.dmp

    Filesize

    296KB

  • memory/2232-7-0x00007FFE92730000-0x00007FFE931F1000-memory.dmp

    Filesize

    10.8MB

  • memory/2232-12-0x0000027A21010000-0x0000027A21020000-memory.dmp

    Filesize

    64KB

  • memory/2232-123-0x00007FFE92730000-0x00007FFE931F1000-memory.dmp

    Filesize

    10.8MB

  • memory/2232-126-0x00007FFE92730000-0x00007FFE931F1000-memory.dmp

    Filesize

    10.8MB