Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
20-01-2024 02:10
Static task
static1
Behavioral task
behavioral1
Sample
6618325d64a870040b82fb73575ee669.exe
Resource
win7-20231215-en
General
-
Target
6618325d64a870040b82fb73575ee669.exe
-
Size
1.5MB
-
MD5
6618325d64a870040b82fb73575ee669
-
SHA1
5a7a92a76a832d7a5fc37577af8ebb7078cff6e2
-
SHA256
8298df16c667b88f524bf2cbb79c7f1122fe0f1c95502c5a4e37fa69999affcb
-
SHA512
641e2c1b6b4c0d1efa590511ead2f46154367a6a9a0a7ac3b7791e2f285214bd8b7ed2309b5c5e59c66475931a2f5245268f99e44f820ecd2bedbb2f6bd233c9
-
SSDEEP
24576:JhvJVJdMJ7uLp3iEOwnBYnRIOzm3QHxumDWsWT+T6kcfTj4WEs4x8Ka23x:x3dXLp3iEOwnk8BmDCTdkcojxpx
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/866738169181372456/leUwW_rAYekiwOVhgk8WOe6mYy271-wPgyPdfdgGkW3LvRIrgaePX3yC-m_SGyjcPYeJ
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2768 ST.exe -
Loads dropped DLL 4 IoCs
pid Process 2424 6618325d64a870040b82fb73575ee669.exe 2424 6618325d64a870040b82fb73575ee669.exe 2424 6618325d64a870040b82fb73575ee669.exe 2424 6618325d64a870040b82fb73575ee669.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 freegeoip.app 5 freegeoip.app -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2768 ST.exe 2768 ST.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 ST.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier ST.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2768 ST.exe 2768 ST.exe 2768 ST.exe 2768 ST.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2768 ST.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2768 ST.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2424 wrote to memory of 2768 2424 6618325d64a870040b82fb73575ee669.exe 28 PID 2424 wrote to memory of 2768 2424 6618325d64a870040b82fb73575ee669.exe 28 PID 2424 wrote to memory of 2768 2424 6618325d64a870040b82fb73575ee669.exe 28 PID 2424 wrote to memory of 2768 2424 6618325d64a870040b82fb73575ee669.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\6618325d64a870040b82fb73575ee669.exe"C:\Users\Admin\AppData\Local\Temp\6618325d64a870040b82fb73575ee669.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\ST.exe"C:\Users\Admin\AppData\Local\Temp\ST.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105B
MD52e9d094dda5cdc3ce6519f75943a4ff4
SHA15d989b4ac8b699781681fe75ed9ef98191a5096c
SHA256c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142
SHA512d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7
-
Filesize
1.2MB
MD50d1ce9ec311262c574e65633549c9c4a
SHA1541ba677282a00d73a18fc06123cf7c61a1d1f57
SHA25664f4e1cdebbb2d16e19e189aa15ac511039b998d837b04aa34fca073084af019
SHA512daa70c786ac049a18132718ec3bb05480cc97ff92419f9bb78614e93de2dff9c8d034c823ecad7a2323c52a554d83ee826d9c46e3a1c4942e842a3597074e96d