Analysis
-
max time kernel
128s -
max time network
166s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 20:47
Static task
static1
Behavioral task
behavioral1
Sample
8d88b6afcfdf51afa91d7fbdbda3123f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8d88b6afcfdf51afa91d7fbdbda3123f.exe
Resource
win10v2004-20231222-en
General
-
Target
8d88b6afcfdf51afa91d7fbdbda3123f.exe
-
Size
3.7MB
-
MD5
8d88b6afcfdf51afa91d7fbdbda3123f
-
SHA1
8992be4a6ad43f41f4098f5f6e16c52ce1a15128
-
SHA256
f1a5c8f4f3ab1e52cb2b85da2c0a0a1196600d77864b2a08f10994df7ca19e47
-
SHA512
1df17fbc715acee1c6a8067372c08e6566b50a92840af6d3369d00cf6f0cad9256f5d16f22f57055db89a9fb10520506f51f97eabf5177201f31fe9119df1527
-
SSDEEP
98304:ebvEDT/eSXK4YubNjNS/AAjz0h+9I/E9rep:eE/LYuFNp4++hSp
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/867414880008142858/TD_59PPDbRxUvtxfYmpmvXB-AISV68npXT3nWVWmC5qoDjluGk0XKjmzmpP1jyAwpfZk
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2888 cryptTROJAN.sfx.exe 1052 cryptTROJAN.exe -
Loads dropped DLL 7 IoCs
pid Process 308 8d88b6afcfdf51afa91d7fbdbda3123f.exe 308 8d88b6afcfdf51afa91d7fbdbda3123f.exe 308 8d88b6afcfdf51afa91d7fbdbda3123f.exe 2888 cryptTROJAN.sfx.exe 2888 cryptTROJAN.sfx.exe 2888 cryptTROJAN.sfx.exe 2888 cryptTROJAN.sfx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 freegeoip.app 3 freegeoip.app -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 1052 cryptTROJAN.exe 1052 cryptTROJAN.exe 1052 cryptTROJAN.exe 1052 cryptTROJAN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 cryptTROJAN.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier cryptTROJAN.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1052 cryptTROJAN.exe 1052 cryptTROJAN.exe 1052 cryptTROJAN.exe 1052 cryptTROJAN.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1052 cryptTROJAN.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1052 cryptTROJAN.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 308 wrote to memory of 2888 308 8d88b6afcfdf51afa91d7fbdbda3123f.exe 27 PID 308 wrote to memory of 2888 308 8d88b6afcfdf51afa91d7fbdbda3123f.exe 27 PID 308 wrote to memory of 2888 308 8d88b6afcfdf51afa91d7fbdbda3123f.exe 27 PID 308 wrote to memory of 2888 308 8d88b6afcfdf51afa91d7fbdbda3123f.exe 27 PID 2888 wrote to memory of 1052 2888 cryptTROJAN.sfx.exe 28 PID 2888 wrote to memory of 1052 2888 cryptTROJAN.sfx.exe 28 PID 2888 wrote to memory of 1052 2888 cryptTROJAN.sfx.exe 28 PID 2888 wrote to memory of 1052 2888 cryptTROJAN.sfx.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d88b6afcfdf51afa91d7fbdbda3123f.exe"C:\Users\Admin\AppData\Local\Temp\8d88b6afcfdf51afa91d7fbdbda3123f.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:308 -
C:\Users\Admin\AppData\Local\Temp\cryptTROJAN.sfx.exe"C:\Users\Admin\AppData\Local\Temp\cryptTROJAN.sfx.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\cryptTROJAN.exe"C:\Users\Admin\AppData\Local\Temp\cryptTROJAN.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1052
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377B
MD593fd0e6e4939005c0eed8dd51984a7d4
SHA1e6c9339826d2c2508201ac722227fb655119584b
SHA256dc79cfc0f70516632fa2123bbe73046cbd080c1f765f43e229df383082deafc9
SHA512544ae26f2a6dfca46b9eb5439a672c97c7c28b40647a0abdf7cd2da99de379db7655d83518a35c74059060a51336ed20a8094e78fda2ef3788281c721626372e
-
Filesize
1.2MB
MD56bc1ac14fb765bc7aa33a62e6e7701d7
SHA14455de5129e69a432de89611ee791b1e2f40111f
SHA25668f3e5266ef869124be9372c77b53a116d6ddc5e11f74fb920bd1d58bcfd4968
SHA5126dffbecadc1e7784687960b807354abd85e7872435f033480c49ceedd08a3e40446343ffbf1f435be1779545d7b834eac5e346353c5b43e1cf0ab1df8e7e5fcc
-
Filesize
1.5MB
MD53f5d5939fc0c515ddbc9e9894e34ae04
SHA18e77baff4342245a4fe90ddfc42297c778580c07
SHA256c2667527dd33a4d633aafc8a8fe44a50b0745693c427363251ac1d28ed1a330c
SHA5126606009775077c7756d00cf3dcb9840f33de5c823ac36e11a1de226c1ca468d026bb709e2bbcfb5b416bdf804e064067bbb455d609d418dc6ff5bd2197eeec75