Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 06:51
Static task
static1
Behavioral task
behavioral1
Sample
117b28e18c3cdee58cee6f5b4c6b708b.exe
Resource
win7-20231215-en
General
-
Target
117b28e18c3cdee58cee6f5b4c6b708b.exe
-
Size
1.2MB
-
MD5
117b28e18c3cdee58cee6f5b4c6b708b
-
SHA1
bf3f7cf88712b01a8123d3836bf19f25b17a70ec
-
SHA256
b356d0dfecf39874a2bbbe4cae33f580d91a8991860df23314f35950f574485c
-
SHA512
3a2331e1f7266a262e308eab726ee43127631c7348e7931186d13f54577abb1a18a92d6a6664dc69a9cbe9098914bd0e6173d1adc634a545b9c87b3bedd600ea
-
SSDEEP
24576:8Shu0Xd9baM1zjL0KfafjvjZLJNWttqmO96tY:8SL7VUfjJWttlO9IY
Malware Config
Extracted
44caliber
https://discordapp.com/api/webhooks/859014405580783637/J-rOLcLQORAp4rSIpre0H46Lhmzd8QK1hgRFNA4mqYSEz6dtJRq9HsK-id725NgqZTvK
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 freegeoip.app 3 freegeoip.app -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1940 117b28e18c3cdee58cee6f5b4c6b708b.exe 1940 117b28e18c3cdee58cee6f5b4c6b708b.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 117b28e18c3cdee58cee6f5b4c6b708b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 117b28e18c3cdee58cee6f5b4c6b708b.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1940 117b28e18c3cdee58cee6f5b4c6b708b.exe 1940 117b28e18c3cdee58cee6f5b4c6b708b.exe 1940 117b28e18c3cdee58cee6f5b4c6b708b.exe 1940 117b28e18c3cdee58cee6f5b4c6b708b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1940 117b28e18c3cdee58cee6f5b4c6b708b.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1940 117b28e18c3cdee58cee6f5b4c6b708b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\117b28e18c3cdee58cee6f5b4c6b708b.exe"C:\Users\Admin\AppData\Local\Temp\117b28e18c3cdee58cee6f5b4c6b708b.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1940
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397B
MD54e177750be99f164264730e187be9338
SHA151c2a86ab01b1b14a896ae47668c6c5baee71167
SHA25602ff2e07531616c7b3ba115cc723c9941c24145fc96684bd184fbd6c3077f029
SHA51269ea8143d4b5f7c79acbbb1c1862e1b6d09c85920e9ca2351f5ba13df772e3676d55da252c85b2fe089a63e0e1752ffd6ce426abd29d777908b1ce47f2ab4492