Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    17-02-2024 19:54

General

  • Target

    0x000a0000000122c9-5.exe

  • Size

    534KB

  • MD5

    0ce3051b867d50aa172d1b332f156e3e

  • SHA1

    f87defe312cb3a5efea3f845d187762e153bddab

  • SHA256

    5ac29f18472f943f2eb3c256fdbfe251b04ca66afc22fcba65183b0509feb529

  • SHA512

    5169a3acd3c79cc4d22bf3a1f4d9770797d2c31503bab1022a153ad56c382e495de2ce06a8a04b3bb4b2fb2c666575dcdefa26533ff5affc4b6ce126e2166193

  • SSDEEP

    6144:ef+BLtABPDLgj1xw1eO5rbMMzhgUsYqTXGG/5zJRb2IXe05f4VGWWxjdq:d161eO5rbHHsYqTXGOXXe+4k8

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/1199323175729758268/CBdP8e3cXbL0ED8xKBhMw0ikKHmITu-6CI4WjfttZm2aWGZGjp43Msrjwp8AVeEBf6T1

Signatures

  • 44Caliber

    An open source infostealer written in C#.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0x000a0000000122c9-5.exe
    "C:\Users\Admin\AppData\Local\Temp\0x000a0000000122c9-5.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1728

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\44\Process.txt

    Filesize

    85B

    MD5

    f89268b661047bc4fc59c49561434cf3

    SHA1

    3f5dbe67ba7b5dc8a407b89bb36f670d05378f41

    SHA256

    1bc7aa71b4614cab583a5244361d641d3aa99f2a9bd16cef2f88162f6aa99f2d

    SHA512

    a3c3ee6158d11cf5d55e57b47fa42d724dbf848adf7f8df14e0aed030239b07483deee10723b5ab0ff2dc9297c830cb06f7a576fe6596ee325d6352987342652

  • C:\ProgramData\44\Process.txt

    Filesize

    400B

    MD5

    94de561932ecb762765287c2c41de850

    SHA1

    058720c067f26f0569c55d0af282a968612d33d2

    SHA256

    beb2d50f92c165b101ba85dfd76b5f3c046af6206e229cd431974645d188b5ee

    SHA512

    db31e5a51bbead5fa4051fca91b9422ab9a61fe8663cfc792c21c913e38f3930be8b15aaefe6dcdac52ed74ae573e3e274a06c2b8e54ff9e782272ec739545bc

  • memory/1728-0-0x0000000000C10000-0x0000000000C9A000-memory.dmp

    Filesize

    552KB

  • memory/1728-1-0x000007FEF6440000-0x000007FEF6E2C000-memory.dmp

    Filesize

    9.9MB

  • memory/1728-2-0x000000001B520000-0x000000001B5A0000-memory.dmp

    Filesize

    512KB

  • memory/1728-50-0x000007FEF6440000-0x000007FEF6E2C000-memory.dmp

    Filesize

    9.9MB