Analysis
-
max time kernel
132s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2023 06:49
Behavioral task
behavioral1
Sample
b1182007e714621a5ecbfd6fbe486889cd16c2099eea069ab787b8edeade1cdb.exe
Resource
win7-20231130-en
General
-
Target
b1182007e714621a5ecbfd6fbe486889cd16c2099eea069ab787b8edeade1cdb.exe
-
Size
274KB
-
MD5
57ccf63a7e54b14239f13b49c90c6624
-
SHA1
dad4d1a51104b449f5c68d6e367c1e330c3d689b
-
SHA256
b1182007e714621a5ecbfd6fbe486889cd16c2099eea069ab787b8edeade1cdb
-
SHA512
4061844766b440f483bce85e900e1e121780eb57e7b47d7a13ddcd34c48de02bd9c55fc2350174e3efeeccecb6505d112feac8c8049414857e6f1d5fb90ef271
-
SSDEEP
6144:uf+BLtABPDM5pPTgxWGomsXSb6WtafTy8lI1D0lvP:R57hmsXS6Yx1DSP
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1180235571138936842/0LJ571UFuTLaKpO7KBs12_uE0OnG-UkEHb7l8uaUnAlrrOyMv1lU6nnxKlX7bg-fad7L
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 7 freegeoip.app 8 freegeoip.app -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
b1182007e714621a5ecbfd6fbe486889cd16c2099eea069ab787b8edeade1cdb.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 b1182007e714621a5ecbfd6fbe486889cd16c2099eea069ab787b8edeade1cdb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier b1182007e714621a5ecbfd6fbe486889cd16c2099eea069ab787b8edeade1cdb.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
b1182007e714621a5ecbfd6fbe486889cd16c2099eea069ab787b8edeade1cdb.exepid process 4988 b1182007e714621a5ecbfd6fbe486889cd16c2099eea069ab787b8edeade1cdb.exe 4988 b1182007e714621a5ecbfd6fbe486889cd16c2099eea069ab787b8edeade1cdb.exe 4988 b1182007e714621a5ecbfd6fbe486889cd16c2099eea069ab787b8edeade1cdb.exe 4988 b1182007e714621a5ecbfd6fbe486889cd16c2099eea069ab787b8edeade1cdb.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
b1182007e714621a5ecbfd6fbe486889cd16c2099eea069ab787b8edeade1cdb.exedescription pid process Token: SeDebugPrivilege 4988 b1182007e714621a5ecbfd6fbe486889cd16c2099eea069ab787b8edeade1cdb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1182007e714621a5ecbfd6fbe486889cd16c2099eea069ab787b8edeade1cdb.exe"C:\Users\Admin\AppData\Local\Temp\b1182007e714621a5ecbfd6fbe486889cd16c2099eea069ab787b8edeade1cdb.exe"1⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
735B
MD5917eef34f993df60b80be0fe31e2ba41
SHA1a0ece1b9d25573e3c6faf0d158a86052aaab4dcd
SHA25640e05d06d040ecc0784b32588e57eeec8db02c60cbe2f6f7bd2145f9c735f482
SHA51293d5b4805a9718c2c77898589b29d1d097897bfb805fb5d9defc2bd268ac997967db3846690eed696e96daae099f9fee1a44f1647ded6cb51dfd812a1fc0ad45
-
Filesize
749B
MD52f9af51d3d249a28002e2917b80f5922
SHA1314c0b5c44ba99e8e8c87c584999c286efda4456
SHA2565e48e94aff53f83028f3e05d0d6b5eee823bcb48d23a64b9b3137cf1c4758c2b
SHA512b107eee17628cecc97b26e90597a1dcbd045692b0280ecba8f68ae0db7cf5704ffcf189860d9b7370e766dc5b1af44ef6c1f2b2192adbed7c08c06e873089995
-
Filesize
1KB
MD5c4f20f544fdbb613473a8d4247a774d7
SHA1d6bb05300aa00d2216182a2d1c4062df6c25d816
SHA256fa52845f122f63e299837f60a5a249bd8d3795534e3698d69c25c39429722f93
SHA512fba83c558a1f020e2c3a9244e94c5c01968b4c3e5677d08523f80fabc72f03d1c176949dd336f3b7cfd2685676c7b03ac3505a2526cf14593e8bcbec7931b0f0