Analysis
-
max time kernel
13s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 03:34
Static task
static1
Behavioral task
behavioral1
Sample
0d1ce9ec311262c574e65633549c9c4a.exe
Resource
win7-20231215-en
General
-
Target
0d1ce9ec311262c574e65633549c9c4a.exe
-
Size
1.2MB
-
MD5
0d1ce9ec311262c574e65633549c9c4a
-
SHA1
541ba677282a00d73a18fc06123cf7c61a1d1f57
-
SHA256
64f4e1cdebbb2d16e19e189aa15ac511039b998d837b04aa34fca073084af019
-
SHA512
daa70c786ac049a18132718ec3bb05480cc97ff92419f9bb78614e93de2dff9c8d034c823ecad7a2323c52a554d83ee826d9c46e3a1c4942e842a3597074e96d
-
SSDEEP
24576:0WJtTGnwqb3ZWZfbuoDGOkf/FaIGoXjTv:0WPTGnpb3ZKTue2dT
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/866738169181372456/leUwW_rAYekiwOVhgk8WOe6mYy271-wPgyPdfdgGkW3LvRIrgaePX3yC-m_SGyjcPYeJ
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 freegeoip.app -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 2860 0d1ce9ec311262c574e65633549c9c4a.exe 2860 0d1ce9ec311262c574e65633549c9c4a.exe 2860 0d1ce9ec311262c574e65633549c9c4a.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2784 2860 WerFault.exe 16 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2860 0d1ce9ec311262c574e65633549c9c4a.exe 2860 0d1ce9ec311262c574e65633549c9c4a.exe 2860 0d1ce9ec311262c574e65633549c9c4a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2860 0d1ce9ec311262c574e65633549c9c4a.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2860 0d1ce9ec311262c574e65633549c9c4a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2784 2860 0d1ce9ec311262c574e65633549c9c4a.exe 28 PID 2860 wrote to memory of 2784 2860 0d1ce9ec311262c574e65633549c9c4a.exe 28 PID 2860 wrote to memory of 2784 2860 0d1ce9ec311262c574e65633549c9c4a.exe 28 PID 2860 wrote to memory of 2784 2860 0d1ce9ec311262c574e65633549c9c4a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d1ce9ec311262c574e65633549c9c4a.exe"C:\Users\Admin\AppData\Local\Temp\0d1ce9ec311262c574e65633549c9c4a.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2860 -s 10882⤵
- Program crash
PID:2784
-