Analysis

  • max time kernel
    128s
  • max time network
    166s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26-12-2023 20:47

General

  • Target

    8d88b6afcfdf51afa91d7fbdbda3123f.exe

  • Size

    3.7MB

  • MD5

    8d88b6afcfdf51afa91d7fbdbda3123f

  • SHA1

    8992be4a6ad43f41f4098f5f6e16c52ce1a15128

  • SHA256

    f1a5c8f4f3ab1e52cb2b85da2c0a0a1196600d77864b2a08f10994df7ca19e47

  • SHA512

    1df17fbc715acee1c6a8067372c08e6566b50a92840af6d3369d00cf6f0cad9256f5d16f22f57055db89a9fb10520506f51f97eabf5177201f31fe9119df1527

  • SSDEEP

    98304:ebvEDT/eSXK4YubNjNS/AAjz0h+9I/E9rep:eE/LYuFNp4++hSp

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/867414880008142858/TD_59PPDbRxUvtxfYmpmvXB-AISV68npXT3nWVWmC5qoDjluGk0XKjmzmpP1jyAwpfZk

Signatures

  • 44Caliber

    An open source infostealer written in C#.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d88b6afcfdf51afa91d7fbdbda3123f.exe
    "C:\Users\Admin\AppData\Local\Temp\8d88b6afcfdf51afa91d7fbdbda3123f.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:308
    • C:\Users\Admin\AppData\Local\Temp\cryptTROJAN.sfx.exe
      "C:\Users\Admin\AppData\Local\Temp\cryptTROJAN.sfx.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2888
      • C:\Users\Admin\AppData\Local\Temp\cryptTROJAN.exe
        "C:\Users\Admin\AppData\Local\Temp\cryptTROJAN.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\44\Process.txt

    Filesize

    377B

    MD5

    93fd0e6e4939005c0eed8dd51984a7d4

    SHA1

    e6c9339826d2c2508201ac722227fb655119584b

    SHA256

    dc79cfc0f70516632fa2123bbe73046cbd080c1f765f43e229df383082deafc9

    SHA512

    544ae26f2a6dfca46b9eb5439a672c97c7c28b40647a0abdf7cd2da99de379db7655d83518a35c74059060a51336ed20a8094e78fda2ef3788281c721626372e

  • \Users\Admin\AppData\Local\Temp\cryptTROJAN.exe

    Filesize

    1.2MB

    MD5

    6bc1ac14fb765bc7aa33a62e6e7701d7

    SHA1

    4455de5129e69a432de89611ee791b1e2f40111f

    SHA256

    68f3e5266ef869124be9372c77b53a116d6ddc5e11f74fb920bd1d58bcfd4968

    SHA512

    6dffbecadc1e7784687960b807354abd85e7872435f033480c49ceedd08a3e40446343ffbf1f435be1779545d7b834eac5e346353c5b43e1cf0ab1df8e7e5fcc

  • \Users\Admin\AppData\Local\Temp\cryptTROJAN.sfx.exe

    Filesize

    1.5MB

    MD5

    3f5d5939fc0c515ddbc9e9894e34ae04

    SHA1

    8e77baff4342245a4fe90ddfc42297c778580c07

    SHA256

    c2667527dd33a4d633aafc8a8fe44a50b0745693c427363251ac1d28ed1a330c

    SHA512

    6606009775077c7756d00cf3dcb9840f33de5c823ac36e11a1de226c1ca468d026bb709e2bbcfb5b416bdf804e064067bbb455d609d418dc6ff5bd2197eeec75

  • memory/1052-34-0x0000000000030000-0x00000000003DC000-memory.dmp

    Filesize

    3.7MB

  • memory/1052-35-0x0000000073D20000-0x000000007440E000-memory.dmp

    Filesize

    6.9MB

  • memory/1052-36-0x0000000005960000-0x00000000059A0000-memory.dmp

    Filesize

    256KB

  • memory/1052-59-0x0000000073D20000-0x000000007440E000-memory.dmp

    Filesize

    6.9MB

  • memory/1052-88-0x0000000005960000-0x00000000059A0000-memory.dmp

    Filesize

    256KB

  • memory/1052-90-0x0000000000030000-0x00000000003DC000-memory.dmp

    Filesize

    3.7MB

  • memory/1052-91-0x0000000073D20000-0x000000007440E000-memory.dmp

    Filesize

    6.9MB

  • memory/2888-32-0x0000000003A70000-0x0000000003E1C000-memory.dmp

    Filesize

    3.7MB

  • memory/2888-30-0x0000000003A70000-0x0000000003E1C000-memory.dmp

    Filesize

    3.7MB