Analysis
-
max time kernel
121s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12-10-2023 19:07
Behavioral task
behavioral1
Sample
interium_crack.exe
Resource
win7-20230831-en
General
-
Target
interium_crack.exe
-
Size
274KB
-
MD5
7304d91a9b1a9aa8b85e3922c134c1fc
-
SHA1
fda49f2c05e7446d7b40246d6346782ff4ca8250
-
SHA256
90da0f65e1b0635663ac57db702127175c8400f7db5dd1384a4346b4d76f279f
-
SHA512
6ca6b4dee184faa10e43f678bec5131ef05833979d1a0bee7a6c87cd9a5add9c1857f2e9d97d9e2e5bcb69eaf73fa938f6ec2f765ae70bd90dcd53165a7521bc
-
SSDEEP
6144:4f+BLtABPDj0LF5jsP78dEEoIrceRsMsmZ0MI1e0C7L:c0PjfSEoIrVk1ejL
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1151153702359535737/SNgzUJ16Y9V-Kp27Hyby1d0TAb5FgALa9RCHRaKLGuk5MliboFTb9Cg-KDoL2MAYQLOp
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 freegeoip.app 5 freegeoip.app -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
interium_crack.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 interium_crack.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier interium_crack.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
interium_crack.exepid process 1872 interium_crack.exe 1872 interium_crack.exe 1872 interium_crack.exe 1872 interium_crack.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
interium_crack.exedescription pid process Token: SeDebugPrivilege 1872 interium_crack.exe