Analysis
-
max time kernel
127s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2023 16:17
Behavioral task
behavioral1
Sample
deadsense.exe
Resource
win7-20231023-en
General
-
Target
deadsense.exe
-
Size
274KB
-
MD5
3052e30d962a23b4e3766f025b8d6c21
-
SHA1
97bec7796489888ad6aacdc5f3281f88c0287cf1
-
SHA256
a35b29189e4ea69890b73e5c64a26a3badc61b9e2084ddfa1a959bc6241ff1dd
-
SHA512
cf9a993eeba2440a6bacedff874a3b84e7112e6f11dfebc4d591380b462bdb1a247099290c5fa448d0431daa7ec55080db6d23219da1c10ca2a168ade5e4b680
-
SSDEEP
6144:Zf+BLtABPDWlR1ZroWT0Ilb5wqlYeJClA1D0Ne9:4luK0Ilb5/lYe11Dx9
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1106246820465754193/PhLXU_8QVd9PKEsWp1wYfiuAgulXvdo3vNtxDX_F2rZvdBoVeobiSd4lhoRwXHxlyOwF
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 19 freegeoip.app 20 freegeoip.app -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 deadsense.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier deadsense.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2452 deadsense.exe 2452 deadsense.exe 2452 deadsense.exe 2452 deadsense.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2452 deadsense.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD552fe2cc3a51e09c7be347c3806a8156e
SHA10cd4577eaa16833457688d0684c48baef914c531
SHA25629e1a2b154541b0ddac394fa1808d204fed35287e87ee18acc97d14086c2f3c7
SHA5126ba6149ade28a5d09663570ec836c7255189a8ee5b9ea0ed0955cea22714f1f340f8f43a51e1d1f9d6389d84c2df67d442b12275892ce3277c1ee5afdc8c74c9