Analysis
-
max time kernel
93s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
17-02-2024 19:54
Behavioral task
behavioral1
Sample
0x000a0000000122c9-5.exe
Resource
win7-20231215-en
General
-
Target
0x000a0000000122c9-5.exe
-
Size
534KB
-
MD5
0ce3051b867d50aa172d1b332f156e3e
-
SHA1
f87defe312cb3a5efea3f845d187762e153bddab
-
SHA256
5ac29f18472f943f2eb3c256fdbfe251b04ca66afc22fcba65183b0509feb529
-
SHA512
5169a3acd3c79cc4d22bf3a1f4d9770797d2c31503bab1022a153ad56c382e495de2ce06a8a04b3bb4b2fb2c666575dcdefa26533ff5affc4b6ce126e2166193
-
SSDEEP
6144:ef+BLtABPDLgj1xw1eO5rbMMzhgUsYqTXGG/5zJRb2IXe05f4VGWWxjdq:d161eO5rbHHsYqTXGOXXe+4k8
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1199323175729758268/CBdP8e3cXbL0ED8xKBhMw0ikKHmITu-6CI4WjfttZm2aWGZGjp43Msrjwp8AVeEBf6T1
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 freegeoip.app 1 freegeoip.app -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 0x000a0000000122c9-5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 0x000a0000000122c9-5.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5088 0x000a0000000122c9-5.exe 5088 0x000a0000000122c9-5.exe 5088 0x000a0000000122c9-5.exe 5088 0x000a0000000122c9-5.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5088 0x000a0000000122c9-5.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
407B
MD507e1146ac23766d00607594d42cb24a7
SHA1a65e358e6b7013fe4c296b0aea419ff6509ffeee
SHA2566e0ac302985f3adc6ff4d1d41b1a6a0ef1a1f986c7c999cdfb01606ed11e6e19
SHA512e8702b8df12190be50e2041a848add1d3b7b474be005bade3f27cae5688efe546de6e60dfea33ea9558c36b6bcde7c38884f852b5b1b0a696e73e9f969d8bd0b
-
Filesize
668B
MD537310e87b763364c0360a9d943b59780
SHA1978f520a02e4f2cd10a75c156836085c93b5ec14
SHA256177a8d3d79cdee94e3b565daf0bac24fad60a2ffdb9763cc994e63adc570be71
SHA512f05cb399721b727117ba91119431a4e7f01bddad6ac4336d755fdef979031b41500c385c9cb56350adfb7b5ecd8e9cea57717f1902306c758ca29223139df959
-
Filesize
878B
MD54da4999146cb9d3eb2922b0b76830ed8
SHA193575920042d57bc6ac9b0037cbba2e70b85d378
SHA2563a969684f8ae32df06917895389243e70c4ce5ac8cbb4a8e0969c9e2c7915e77
SHA51242f3a7256f773931ac7925c8e3e489ce99332f584d185bb339adf81507a814d395cbf9c52234d15d349b6e3b079e6d1b8a9a64347aa1d5d6192f8da8b05e70da
-
Filesize
1KB
MD5b7c98116cd2d3790b8eaa35d8daf126a
SHA12a7686fd637cb0c910c739939c9c82e7a0c5221d
SHA2560fa67520c75b03984bcb241ed919cb7f73231f7b263cc31feee1999393b81ad9
SHA5128a464332e37715500a97a9a7f1eeb79b35a57fe4da9d6bb76a399daab856e9a61d8e50890191649276bdaf3d2a77e587e11d92e1ede797e290bf07245ebc1add