Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2023 20:29
Behavioral task
behavioral1
Sample
UnnamedFree.exe
Resource
win7-20230831-en
General
-
Target
UnnamedFree.exe
-
Size
274KB
-
MD5
78ae73a2befd88689698f392a0df4468
-
SHA1
f4294f0b07401cada2c4411deda7e2070dd489f4
-
SHA256
004fbef0b21fbd40bfb0b81356cd8d0423d94a0cf580ab8bc629c5204515e6b7
-
SHA512
b597feaa687e5c11d1fa72d83b2a772217154311b61894a76009012fa0c29a0f5c5ce6eccde2095d60269f06e1310fbb6b8e4133d392b367cf5101a1bd0a0d88
-
SSDEEP
6144:Nf+BLtABPDR45GpbeKpwaUxnaGqqlYeJelA1D0Wl1:f4sFKaUxnaslYep1D/1
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/972090409700438017/FHYZJLIDFB1b4XU06S3DBw5xGN0xv6Ab2vtU1t8_ONL8owU3Qa0pE7RqDTsmfc1lxsPy
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 freegeoip.app 8 freegeoip.app -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 UnnamedFree.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier UnnamedFree.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3948 UnnamedFree.exe 3948 UnnamedFree.exe 3948 UnnamedFree.exe 3948 UnnamedFree.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3948 UnnamedFree.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD586e73b73c3c442f5af3c0aaffd5e2299
SHA1104d8ad570f2a79a1df7d96da356f4430376815b
SHA2569063d6f97da655c53419a521498ed367f1c1376d8b6bd2baceb1a86d1797ff48
SHA5120cae1268a5f0d29b778719b893869905b221e5fe2dfb2a8ee03b94c40614198ca9103661759eb67ab1c519aa05cf74a38a22b304f448abda56931d6f283092f6
-
Filesize
490B
MD52473bf36230cdb73a62f69301f007841
SHA12fbdbfc5066b32be20451bc52dc2772b2aea1b6a
SHA256d8673a42dfb5806a15c794923e6cf2ca62f85ed6703a0920d758b8ab426ab0dc
SHA51210666af4205f777b84b0524b1b2fed56307345eb1a06a0fef7721f8dc9f91a3c10b6b6d99fbcce0a23fbf0f6dab27b3f552329387203fd38f115e3d20176750f
-
Filesize
730B
MD58578fe8a0c6bbc6bc2a3e3189bf53540
SHA1638ec76d9eaf1911da3e260e86d3dadf19ad3e59
SHA25632e31209cd7381d964dc6ad92d9faa1d2d0a08d37848e92c913ade4c41837808
SHA512ba73d4e879cad1114abbd72487b99ebec6734e43ea5942d004e89e13dc24314573dc4c0975eb34f8211a3ccd9dd65801cced73f041cc7de74ffefd9f84c1b781
-
Filesize
1KB
MD52e9487bdd53c32d2886bd747cb3ec562
SHA1077969c93724da95308f193213045999d856b458
SHA25647c289f9646aba3623955cb48a3c989f9fd5a1eaba48fcf1c774234c65ffa066
SHA512c6fbc35be65dd397484218a37255cf2291b43065af4bd309d250c74aa085d1109afc88a333d70f6b81e199023f820d6693dbcdb42325c16d45cfd646bc7fd5a5
-
Filesize
1KB
MD586e73b73c3c442f5af3c0aaffd5e2299
SHA1104d8ad570f2a79a1df7d96da356f4430376815b
SHA2569063d6f97da655c53419a521498ed367f1c1376d8b6bd2baceb1a86d1797ff48
SHA5120cae1268a5f0d29b778719b893869905b221e5fe2dfb2a8ee03b94c40614198ca9103661759eb67ab1c519aa05cf74a38a22b304f448abda56931d6f283092f6