Analysis

  • max time kernel
    127s
  • max time network
    168s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231127-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-12-2023 16:17

General

  • Target

    deadsense.exe

  • Size

    274KB

  • MD5

    3052e30d962a23b4e3766f025b8d6c21

  • SHA1

    97bec7796489888ad6aacdc5f3281f88c0287cf1

  • SHA256

    a35b29189e4ea69890b73e5c64a26a3badc61b9e2084ddfa1a959bc6241ff1dd

  • SHA512

    cf9a993eeba2440a6bacedff874a3b84e7112e6f11dfebc4d591380b462bdb1a247099290c5fa448d0431daa7ec55080db6d23219da1c10ca2a168ade5e4b680

  • SSDEEP

    6144:Zf+BLtABPDWlR1ZroWT0Ilb5wqlYeJClA1D0Ne9:4luK0Ilb5/lYe11Dx9

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/1106246820465754193/PhLXU_8QVd9PKEsWp1wYfiuAgulXvdo3vNtxDX_F2rZvdBoVeobiSd4lhoRwXHxlyOwF

Signatures

  • 44Caliber

    An open source infostealer written in C#.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\deadsense.exe
    "C:\Users\Admin\AppData\Local\Temp\deadsense.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2452

Network

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\44\Process.txt
    Filesize

    1KB

    MD5

    52fe2cc3a51e09c7be347c3806a8156e

    SHA1

    0cd4577eaa16833457688d0684c48baef914c531

    SHA256

    29e1a2b154541b0ddac394fa1808d204fed35287e87ee18acc97d14086c2f3c7

    SHA512

    6ba6149ade28a5d09663570ec836c7255189a8ee5b9ea0ed0955cea22714f1f340f8f43a51e1d1f9d6389d84c2df67d442b12275892ce3277c1ee5afdc8c74c9

  • memory/2452-0-0x000001F75FDF0000-0x000001F75FE3A000-memory.dmp
    Filesize

    296KB

  • memory/2452-29-0x00007FFA67D70000-0x00007FFA68831000-memory.dmp
    Filesize

    10.8MB

  • memory/2452-30-0x000001F7619A0000-0x000001F7619B0000-memory.dmp
    Filesize

    64KB

  • memory/2452-32-0x00007FFA67D70000-0x00007FFA68831000-memory.dmp
    Filesize

    10.8MB

  • memory/2452-33-0x000001F77A5A0000-0x000001F77A749000-memory.dmp
    Filesize

    1.7MB

  • memory/2452-34-0x000001F7619A0000-0x000001F7619B0000-memory.dmp
    Filesize

    64KB

  • memory/2452-122-0x000001F77A5A0000-0x000001F77A749000-memory.dmp
    Filesize

    1.7MB

  • memory/2452-130-0x000001F77A5A0000-0x000001F77A749000-memory.dmp
    Filesize

    1.7MB

  • memory/2452-131-0x00007FFA67D70000-0x00007FFA68831000-memory.dmp
    Filesize

    10.8MB