Analysis

  • max time kernel
    142s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-11-2023 00:45

General

  • Target

    0x00300000000139f5-5.exe

  • Size

    251KB

  • MD5

    513286e3e241f1c93556f45db4f8dc23

  • SHA1

    32c83261b6ac5663e91664764aab429e6cd424d1

  • SHA256

    a46070cb169ed0754c0fb624ad29f59fbc66fb75df9d2b3daefda76bc0d0d893

  • SHA512

    890a2d7a72cf9975ebd716ad3c6f05f595afd1218106054c3c33ff1b9d41baf52c0013b8f65d975d372151b3303311f6554cb412fbcbbb0cf01dc8e81109f693

  • SSDEEP

    3072:CF7zU2iSjjusPFspsXuZgPBU13oNod6bc82hfZRO6FYSZUjBs8R5JCXfhI/KQ73h:azUyjHsmPBUqN26bjYRrFYSeprZ

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/1162710207558852689/c241__Tv-C5fSE0jsivUVIhYUTy9AQG_2q-Wedc4i61WcTidBFF8dAoQzbri3Cz5u5KI

Signatures

  • 44Caliber

    An open source infostealer written in C#.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0x00300000000139f5-5.exe
    "C:\Users\Admin\AppData\Local\Temp\0x00300000000139f5-5.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2496

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\44\Process.txt

    Filesize

    1KB

    MD5

    26710c222d2ce0bea5313db4d33527be

    SHA1

    e207c293576a2f6027d2cf98272acb4e1f1a0e91

    SHA256

    a2c07cfb311e4914239322dfab2b980b416f776fb35bf4c8421d61795c4e581e

    SHA512

    f871d50719be11776fccc1422adea7acdfe79dcac71cfb80d6697fdb755895e6797a6b356a41f1c76e4fd8a5d2f758a35ac7aae630e0ee110b42c7053fcfc648

  • memory/2496-0-0x00000288B9DB0000-0x00000288B9DF6000-memory.dmp

    Filesize

    280KB

  • memory/2496-3-0x00007FF8B8010000-0x00007FF8B8AD1000-memory.dmp

    Filesize

    10.8MB

  • memory/2496-12-0x00000288D4470000-0x00000288D4480000-memory.dmp

    Filesize

    64KB

  • memory/2496-119-0x00007FF8B8010000-0x00007FF8B8AD1000-memory.dmp

    Filesize

    10.8MB