Analysis

  • max time kernel
    180s
  • max time network
    187s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-01-2024 14:24

General

  • Target

    4e896524210ad3a26c70e5b835a7f791.exe

  • Size

    598KB

  • MD5

    4e896524210ad3a26c70e5b835a7f791

  • SHA1

    56266f2cfcccaadd39a76fd2b71f776d81777f7e

  • SHA256

    9aa6cc584cb71f79cd0bed533930514f04b3f1f84163cd0fa5808e6d88d26362

  • SHA512

    bfa8ed75ec6da65875ca654092930cd3ebac0f8e8f2c1650c9dc67e570de5f4622edd20d4b7398365e0bcba2e52c8b5214221fd347c296065bbc40913ea046de

  • SSDEEP

    12288:1tqe3zJK6Y69eyXf1DBLP/NtvEbCzCo06qVwe6FQp9ioP0:bdI6F3PTsbCx06qH6F4RP

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/855417360688480256/JUyPPd3soXD0X_vllpMQMEAEAMSAs1J4iX2r2jRuXhB3kX2tHimYk-jMIi71U29HYoiG

Signatures

  • 44Caliber

    An open source infostealer written in C#.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4e896524210ad3a26c70e5b835a7f791.exe
    "C:\Users\Admin\AppData\Local\Temp\4e896524210ad3a26c70e5b835a7f791.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2776

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\44\Process.txt

    Filesize

    1KB

    MD5

    bc95ac4b13ef397ab2beea51e5d2ae67

    SHA1

    a33875212c90893573824f5fc1f91706b55de238

    SHA256

    17f8861df48048bf1f9c7615f84920093ea675217d748567818caf820c9facbd

    SHA512

    68e052d7270f1abed9338d012162c13b065cc0ebf91ef18306a0f5095ff1eb402fef42989a83a0f13b4c8eae589d5989f9c0b09f54d6aab9899015859a2a87ce

  • C:\Users\Admin\AppData\Roaming\44\Process.txt

    Filesize

    357B

    MD5

    21d1ee3480a63631587a7fae88ebfc84

    SHA1

    bf75d36349df6a01be4a391892b0bb726dd9c922

    SHA256

    ba7f43e0f7c626f7c7168751a13633846ac7e66ec76f7ffb69e7f247dc434150

    SHA512

    876c7c5fa5dae3712cc68500257e967bc2957b237deadb163e684660a9cd36ff9df0ae7c7c752734bd729cc9085d0ef7a63ec57de87895d7225a606311f19645

  • C:\Users\Admin\AppData\Roaming\44\Process.txt

    Filesize

    602B

    MD5

    2fabff2bde9b857d826ad3f765e3782a

    SHA1

    5ad3ade3cc29460d828b2aa24de35917a9834588

    SHA256

    422023c9941f7a922aaf8c09176c174dc84c5dcddfc5eadddc2d6ac3bc59b6e9

    SHA512

    17d014e80a45143d9915589ecd225b991cdbfe82e007e95bd7d02f1b1efaad0e58f8ebfd88e5d0b7122c52618a79c4389d3ac7435e25a9fcfe93fb45fda40baa

  • memory/2776-0-0x0000000000760000-0x00000000007FA000-memory.dmp

    Filesize

    616KB

  • memory/2776-30-0x00007FF849F80000-0x00007FF84AA41000-memory.dmp

    Filesize

    10.8MB

  • memory/2776-31-0x000000001B3B0000-0x000000001B3C0000-memory.dmp

    Filesize

    64KB

  • memory/2776-125-0x00007FF849F80000-0x00007FF84AA41000-memory.dmp

    Filesize

    10.8MB