Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2023 00:45

General

  • Target

    0x00300000000139f5-5.exe

  • Size

    251KB

  • MD5

    513286e3e241f1c93556f45db4f8dc23

  • SHA1

    32c83261b6ac5663e91664764aab429e6cd424d1

  • SHA256

    a46070cb169ed0754c0fb624ad29f59fbc66fb75df9d2b3daefda76bc0d0d893

  • SHA512

    890a2d7a72cf9975ebd716ad3c6f05f595afd1218106054c3c33ff1b9d41baf52c0013b8f65d975d372151b3303311f6554cb412fbcbbb0cf01dc8e81109f693

  • SSDEEP

    3072:CF7zU2iSjjusPFspsXuZgPBU13oNod6bc82hfZRO6FYSZUjBs8R5JCXfhI/KQ73h:azUyjHsmPBUqN26bjYRrFYSeprZ

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/1162710207558852689/c241__Tv-C5fSE0jsivUVIhYUTy9AQG_2q-Wedc4i61WcTidBFF8dAoQzbri3Cz5u5KI

Signatures

  • 44Caliber

    An open source infostealer written in C#.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0x00300000000139f5-5.exe
    "C:\Users\Admin\AppData\Local\Temp\0x00300000000139f5-5.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2268

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\44\Process.txt

    Filesize

    400B

    MD5

    54d155b1d919fb794fa8f874397f5aa4

    SHA1

    cdf8f3771978a5caae583ec5a3d525a3bfc8045a

    SHA256

    e7f2f1ce58ae5afbce2a9de244dc2a622dbe7f0f64547388794c0dafa45d135b

    SHA512

    88edf06404b9d4176610f44688e5e14e449b28d5fe3e7e1af1d0e2a9794bc5abc683e97d5a1e363730e21ff9b22d4e84fb956372dcdf52f9c159e195a750f564

  • memory/2268-0-0x0000000001070000-0x00000000010B6000-memory.dmp

    Filesize

    280KB

  • memory/2268-1-0x000007FEF5AA0000-0x000007FEF648C000-memory.dmp

    Filesize

    9.9MB

  • memory/2268-2-0x000000001B3C0000-0x000000001B440000-memory.dmp

    Filesize

    512KB

  • memory/2268-49-0x000007FEF5AA0000-0x000007FEF648C000-memory.dmp

    Filesize

    9.9MB