Analysis
-
max time kernel
148s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
27-12-2023 13:47
Behavioral task
behavioral1
Sample
Insidious.exe
Resource
win7-20231215-en
General
-
Target
Insidious.exe
-
Size
274KB
-
MD5
2080c22a4df9e8c9e476556e63206599
-
SHA1
5c5393339234228798164654314f0d8de5ce04ca
-
SHA256
738a089b363e1b9f43149def5ae5b136bc9009286e4304e09230e60d0d41e6d0
-
SHA512
d07064ad61a4fe469e8fd21ae3a65d5c64e47e4bb73336aab9eaad984a10888e9b4e88d7fa4f442c46a01ccf7910ca5f6df6e278e05680fe6521ad7adebd25b7
-
SSDEEP
6144:Xf+BLtABPD34JMDSOxIWM8VzZdafTyMlI1D0doN:z4GiWM8Vzdh1DpN
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1189420678399676496/Cv6q-pjb2lOltckEXX8PZeIwdjaBhHevzpPlWHccy6VfWacxjuWV_ETooqcyrrEG3G0e
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 freegeoip.app 6 freegeoip.app -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Insidious.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Insidious.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2428 Insidious.exe 2428 Insidious.exe 2428 Insidious.exe 2428 Insidious.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2428 Insidious.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
730B
MD5f93e8c8b6eff54309120f0d3fb54cd37
SHA1f46496ee8fd506df65bdef763fffdaef099be99c
SHA2569e18a0fd2a964a7f3fc8c8b3243f2c8258fffda363ddb68e9e6559b9031737d5
SHA51244ceb728ae6b1d60fd073b9d0b0e2a5df85c8a78171f104318fff37971879e6df14089d4c6fb81ea388ce5bec1ee3427fa40a0f1677ce676f711764c3c31ec6c
-
Filesize
1KB
MD53a45150bd6264c615b91bc2c0050b476
SHA1472ff2da7b04cc5451fcccdcc543cafd5c9ce2e9
SHA2560832e557085d8fce1ad438127ef3a5da2a1d6b6989179d15a1e3e5985ab0a520
SHA51281ee404431f87b7e23ac7cecb115c317b7c23a82ce8c33824c3213cfcd7b04747e3e0e4ff77a55575b58b849e85427c28cdbbaf880aed7e513f2ef65646c1e3d