Analysis

  • max time kernel
    179s
  • max time network
    196s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-12-2023 01:18

General

  • Target

    48ad7db5fb10dd9b1c6817d5a9c34865.exe

  • Size

    2.2MB

  • MD5

    48ad7db5fb10dd9b1c6817d5a9c34865

  • SHA1

    2fd68670f13f6335a2361fbdd7ed6c36b9f4863c

  • SHA256

    44cf30bb3e4623c4374ab4132bd419d3a63f119b36eaf66f1a5258e36df3b60a

  • SHA512

    7782826d586098b94e2c10a801881e0104784406d9d496c98b2932a33b28f2b0724be7eb25f158223f84483795b4bb768f7e2ad15799c9cb4b2577888909c3fb

  • SSDEEP

    49152:pSezyzdsk+1US6FOZyj2Zi8kwUP+9uNMYuv+ShQFZS:pSdsk+ySemg2Iw0+YChv+Shx

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/850985103400108043/qMVlcxRCEtOy4d0lLo-ckGGqIgWka8O5mwrGC7NwW7qRJs5beglorhRUk-uRy4jQ1Cbz

Signatures

  • 44Caliber

    An open source infostealer written in C#.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\48ad7db5fb10dd9b1c6817d5a9c34865.exe
    "C:\Users\Admin\AppData\Local\Temp\48ad7db5fb10dd9b1c6817d5a9c34865.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4784
    • C:\Users\Admin\AppData\Local\Temp\Insidious — êîïèÿ.exe
      "C:\Users\Admin\AppData\Local\Temp\Insidious — êîïèÿ.exe"
      2⤵
      • Executes dropped EXE
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2996
    • C:\Users\Admin\AppData\Local\Temp\12312.exe
      "C:\Users\Admin\AppData\Local\Temp\12312.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:3420

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

5
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

5
T1082

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\12312.exe
    Filesize

    60KB

    MD5

    f18cf2c76c5e8283a9d81640b198e01b

    SHA1

    29d2b98d71a263ee319cc65109e7325604d203d0

    SHA256

    b54d12aafa616be9524995f8df0527848776c08432556c178667e1429744e34d

    SHA512

    9543bd395281d41c7fafc470812bb920cbd70b918c864b3b245451a2b679ab621401c4857c8da000f952ae73e3c3f084aaaf74a15dc91966caf7680b84f1da04

  • C:\Users\Admin\AppData\Local\Temp\Insidious — êîïèÿ.exe
    Filesize

    274KB

    MD5

    cc0f9ce3587d6a0ee7390ccf8567b764

    SHA1

    0d6b82a85b3ccf11a01482832fcb28e8f97ed68c

    SHA256

    7ce1e233b1994f4db7ded9540bc77f86608a8fed62ed9f58a36aedb9be3723b8

    SHA512

    b56fe5774b378c5dc6c73f9807e07062286b20077cf6a2ba4328d40ae597c0896dd97f955571893fad9e2e88eecd8fb7ffee84261caaee0171cd33e04452e160

  • C:\Users\Admin\AppData\Roaming\44\Process.txt
    Filesize

    715B

    MD5

    525c79cdc3ecb381a7b9d8e01a290a4d

    SHA1

    986d1d82843e118fef5b7dee9517f5b3a096c56d

    SHA256

    a18a65c775a45b94dce0f39595afa9ef11d6d1af31787127b934ba18a21cfc7a

    SHA512

    2ee1da333957ee3e698f958191e2227534b66e62b1509dd64caf6c847b62b96a933ec043f1f0fc6636907d9f3ea414daa7502719759026ede0df0e3ce0dbe480

  • C:\Users\Admin\AppData\Roaming\44\Process.txt
    Filesize

    1KB

    MD5

    076673cf6ef013bbf7133807c9a25063

    SHA1

    964805145eac8580dc97ab5a6678374ffe7a880b

    SHA256

    cbedca261f1e1f71aa7302ad12e74bb32f45e1d538a41769d823b53c6cf645a4

    SHA512

    31597cf5867eeaf804531d3a874b94c43276cc932c12edfa0ab11d0e7d6074d8d1f1dd86a39d1337c8fe05749ad06cd8b7faa3205ac2270d34f1c6fecce8fc3a

  • C:\Users\Admin\AppData\Roaming\44\Process.txt
    Filesize

    405B

    MD5

    e440b7afdd3bdd0710b2a2e1c56319f6

    SHA1

    e620d95abb969c9cc124edb28f7058fd9927bfd5

    SHA256

    12693a6aee70c6ffeb75369695732f3fb21d5bbcf7403dba9fcad77a5ed49808

    SHA512

    c6fb4fcc92348a5c0eb2423d8a5f975de7bba806571bd6f9de4bdc56dfd603f385a45682be707d6a7c9ddb8f9486e2b8d62de7aaf4d9c3643d06d5de11f437b8

  • memory/2996-21-0x0000000000670000-0x00000000006BA000-memory.dmp
    Filesize

    296KB

  • memory/2996-153-0x00007FF8D0630000-0x00007FF8D10F1000-memory.dmp
    Filesize

    10.8MB

  • memory/2996-58-0x000000001B3A0000-0x000000001B3B0000-memory.dmp
    Filesize

    64KB

  • memory/2996-57-0x00007FF8D0630000-0x00007FF8D10F1000-memory.dmp
    Filesize

    10.8MB

  • memory/4784-6-0x0000000002B10000-0x0000000002B11000-memory.dmp
    Filesize

    4KB

  • memory/4784-20-0x0000000000400000-0x000000000092D000-memory.dmp
    Filesize

    5.2MB

  • memory/4784-27-0x0000000000400000-0x000000000092D000-memory.dmp
    Filesize

    5.2MB

  • memory/4784-5-0x0000000002B00000-0x0000000002B01000-memory.dmp
    Filesize

    4KB

  • memory/4784-0-0x0000000000400000-0x000000000092D000-memory.dmp
    Filesize

    5.2MB

  • memory/4784-4-0x0000000000400000-0x000000000092D000-memory.dmp
    Filesize

    5.2MB

  • memory/4784-2-0x0000000000400000-0x000000000092D000-memory.dmp
    Filesize

    5.2MB

  • memory/4784-1-0x0000000076F44000-0x0000000076F46000-memory.dmp
    Filesize

    8KB