Analysis

  • max time kernel
    117s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26-12-2023 01:18

General

  • Target

    48ad7db5fb10dd9b1c6817d5a9c34865.exe

  • Size

    2.2MB

  • MD5

    48ad7db5fb10dd9b1c6817d5a9c34865

  • SHA1

    2fd68670f13f6335a2361fbdd7ed6c36b9f4863c

  • SHA256

    44cf30bb3e4623c4374ab4132bd419d3a63f119b36eaf66f1a5258e36df3b60a

  • SHA512

    7782826d586098b94e2c10a801881e0104784406d9d496c98b2932a33b28f2b0724be7eb25f158223f84483795b4bb768f7e2ad15799c9cb4b2577888909c3fb

  • SSDEEP

    49152:pSezyzdsk+1US6FOZyj2Zi8kwUP+9uNMYuv+ShQFZS:pSdsk+ySemg2Iw0+YChv+Shx

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/850985103400108043/qMVlcxRCEtOy4d0lLo-ckGGqIgWka8O5mwrGC7NwW7qRJs5beglorhRUk-uRy4jQ1Cbz

Signatures

  • 44Caliber

    An open source infostealer written in C#.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 2 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\48ad7db5fb10dd9b1c6817d5a9c34865.exe
    "C:\Users\Admin\AppData\Local\Temp\48ad7db5fb10dd9b1c6817d5a9c34865.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3052
    • C:\Users\Admin\AppData\Local\Temp\Insidious — êîïèÿ.exe
      "C:\Users\Admin\AppData\Local\Temp\Insidious — êîïèÿ.exe"
      2⤵
      • Executes dropped EXE
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2416
    • C:\Users\Admin\AppData\Local\Temp\12312.exe
      "C:\Users\Admin\AppData\Local\Temp\12312.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:1236

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

4
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

4
T1082

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\12312.exe
    Filesize

    60KB

    MD5

    f18cf2c76c5e8283a9d81640b198e01b

    SHA1

    29d2b98d71a263ee319cc65109e7325604d203d0

    SHA256

    b54d12aafa616be9524995f8df0527848776c08432556c178667e1429744e34d

    SHA512

    9543bd395281d41c7fafc470812bb920cbd70b918c864b3b245451a2b679ab621401c4857c8da000f952ae73e3c3f084aaaf74a15dc91966caf7680b84f1da04

  • C:\Users\Admin\AppData\Local\Temp\Insidious — êîïèÿ.exe
    Filesize

    99KB

    MD5

    004988032f3394e039a0c4dbe71f8fb8

    SHA1

    aeaf78fe612e2e36739d16fda575750bc2fca4f9

    SHA256

    d631435fdf8d005ca6cfa0998072fa50e660282d17a214ca71d17cb55ab3d553

    SHA512

    d5f99c20dbcbee3f71cf738dbf7637e40ea7bf0507c6d356d9874b63152fbf7980fd1e9b3f20c1318140b91f595ac2d7a116c581b0e0147efe64ce9924731fc9

  • C:\Users\Admin\AppData\Local\Temp\Insidious — êîïèÿ.exe
    Filesize

    144KB

    MD5

    0a46ca97a46f53213a7c17b436d1c4ec

    SHA1

    99959e543f07511e9bfc969c4f5f461b9782ece5

    SHA256

    7ea8e0a81e5983288005ca07aae6f37c974e8401a55e7fd4b1b3498ed784a2e6

    SHA512

    ccb32574b0d42fc566a0851bcc5a21a3d6d621c6d42d4591a99f92e432b562fbfb4b4567f09dc66b5a6a01afbf601781853f23b1e4eb6cd27298243fde5bddb8

  • \Users\Admin\AppData\Local\Temp\12312.exe
    Filesize

    51KB

    MD5

    1c3a060404d34c0634d2cc1b3a71060c

    SHA1

    3fa6a2623e4ad01a3cb89121dc2114228a3c0b9f

    SHA256

    aaec7f71055e66ad0d86b1e45d3c8ed9dcf8ceb3c61cb4f225f22a606442e1aa

    SHA512

    20c3ef485661c569326b0e0eb511390e9cf624acb1fc87a0473d4e9f1d8499904a16254d0e9eb818005d8685093e2b88fb6cbeba85b0969323022f8c7e28f13a

  • \Users\Admin\AppData\Local\Temp\Insidious — êîïèÿ.exe
    Filesize

    209KB

    MD5

    d7430a5ffd13839637a6849b0706c019

    SHA1

    6b9a3a42a50acaf37581ca692fef9b3850598975

    SHA256

    572fe02ca4e18bf6838478c981e50184455729785f88abb265a55e94f6a6dc82

    SHA512

    d5deb78cceead63a5d35ce7bd8220173dfce13ad21f54a2e1456eb45f5c2b89775823bb387f3f4165dc9648f7fb0489fe2852a0bdb7f2b18c500eea24e834153

  • memory/2416-71-0x000007FEF57A0000-0x000007FEF618C000-memory.dmp
    Filesize

    9.9MB

  • memory/2416-22-0x00000000003E0000-0x0000000000460000-memory.dmp
    Filesize

    512KB

  • memory/2416-21-0x000007FEF57A0000-0x000007FEF618C000-memory.dmp
    Filesize

    9.9MB

  • memory/2416-20-0x0000000000A00000-0x0000000000A4A000-memory.dmp
    Filesize

    296KB

  • memory/3052-6-0x00000000003F0000-0x00000000003F1000-memory.dmp
    Filesize

    4KB

  • memory/3052-4-0x00000000003E0000-0x00000000003E1000-memory.dmp
    Filesize

    4KB

  • memory/3052-5-0x0000000000930000-0x0000000000931000-memory.dmp
    Filesize

    4KB

  • memory/3052-19-0x0000000000400000-0x000000000092D000-memory.dmp
    Filesize

    5.2MB

  • memory/3052-0-0x0000000000400000-0x000000000092D000-memory.dmp
    Filesize

    5.2MB

  • memory/3052-7-0x0000000000940000-0x0000000000941000-memory.dmp
    Filesize

    4KB

  • memory/3052-3-0x0000000000400000-0x000000000092D000-memory.dmp
    Filesize

    5.2MB

  • memory/3052-1-0x0000000077580000-0x0000000077582000-memory.dmp
    Filesize

    8KB