Analysis

  • max time kernel
    143s
  • max time network
    169s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2023 03:23

General

  • Target

    02c9b93a30cac707fcf002a0de796ffa.exe

  • Size

    2.2MB

  • MD5

    02c9b93a30cac707fcf002a0de796ffa

  • SHA1

    bfdc0777ef4d84a248045919fae0e2fc9ba33952

  • SHA256

    d580e3cc2480f082f140cc784c0249f19d0c412d7758fb97ba8e750441188bb6

  • SHA512

    05fde0d4e1afbc0e5d3d7315fee4016caf5a5ed8f2365062cbb8588fb7552d8fd999a82e8f2360336b77bd0ffc9eb39c62aca5992e709f781f80e64bf561feb7

  • SSDEEP

    49152:QwoR6eo4uwBM3RlNpDE15UR43WNKrAdlK4MI0Q:qNokMBlLDE1W+uuAIJ

Malware Config

Signatures

  • 44Caliber

    An open source infostealer written in C#.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\02c9b93a30cac707fcf002a0de796ffa.exe
    "C:\Users\Admin\AppData\Local\Temp\02c9b93a30cac707fcf002a0de796ffa.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3084

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\44\Process.txt

    Filesize

    462B

    MD5

    90ea503fa9dcc8385d943cb71d5bddce

    SHA1

    075625c46872f21e3c709b6841cfbb30b35cb9c8

    SHA256

    af7d487e7970567dc3d1dcb29ed2b22f6e1b06b8076e23493b756762ce97e0ae

    SHA512

    110925ffff39f217046c7d2989a129ccdac3b6ba76c71506a9d07f7b7379b95553becb3fe61d5e60b8188f015de4143f2a5c1be9466220bebd9c3da0f6280d21

  • C:\Users\Admin\AppData\Local\44\Process.txt

    Filesize

    1KB

    MD5

    91c840dae8efd83d01f670141b52f398

    SHA1

    2af3695b38f6b58c051cb6837bd723154b9b012e

    SHA256

    c4f8159cfdc8443176c562943a9da07477192886e9108af57b1c9f4f3d081648

    SHA512

    c1dc203dfc1bc622acb8964168b44e0cea63ad9fa0ff7d9711280452c7eb1f9fa97a3a90a4b3ce1bd1d358d9dd7eafe2d89e37999d9a22b0ae42e4e7b2814ffd

  • memory/3084-0-0x00000000009D0000-0x0000000000C00000-memory.dmp

    Filesize

    2.2MB

  • memory/3084-10-0x00007FF9C99E0000-0x00007FF9CA4A1000-memory.dmp

    Filesize

    10.8MB

  • memory/3084-11-0x0000000001400000-0x0000000001410000-memory.dmp

    Filesize

    64KB

  • memory/3084-125-0x00007FF9C99E0000-0x00007FF9CA4A1000-memory.dmp

    Filesize

    10.8MB