Analysis

  • max time kernel
    132s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    20-02-2024 18:08

General

  • Target

    fly vw.exe

  • Size

    3.0MB

  • MD5

    e9741cbf19fc1947d6c586564585f53f

  • SHA1

    6580de244f3f2f77548376aabf1671a2b76e0b4e

  • SHA256

    72ec0572620cb474a46ee2a6092f3d080c25b66b07d76fd2dd72d3f2388f04a0

  • SHA512

    4560eb4fb3706967e24a0cbcf34387564ab1b0e340a910ed7b925ec5dc80661c7b39a46650586c3991badfd343f3ad3cf67506f5afda4af859784629988b047a

  • SSDEEP

    49152:tM3r1CyUBpXb9OZxkjBJrlrCZ9eZHtFs6SC5bAPLERCpydSECwKWvtY0:qJC1pb9OZ+9dlKwZHtFg8czE0pydSECW

Malware Config

Extracted

Family

44caliber

C2

https://discordapp.com/api/webhooks/1192569430484463717/I6Kwe8DzntI6vhtlBS66UU8vV05EYfDX3mK1x5PPRmeEfRH9iurdtdMxHmv2ZZuW3Ev5

Signatures

  • 44Caliber

    An open source infostealer written in C#.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fly vw.exe
    "C:\Users\Admin\AppData\Local\Temp\fly vw.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2900
    • C:\Windows\system32\cmd.exe
      cmd /c ""C:\Users\Admin\Downloads\Setup.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2740
      • C:\Users\Admin\Downloads\FreeRobux.exe
        FreeRobux.exe -p111 -dC:\Users\Admin\AppData\Roaming
        3⤵
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Checks processor information in registry
        • Modifies system certificate store
        • Suspicious behavior: CmdExeWriteProcessMemorySpam
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2688
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:2124
    • C:\Users\Admin\Downloads\FreeRobux.exe
      "C:\Users\Admin\Downloads\FreeRobux.exe"
      1⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1876
    • C:\Windows\system32\mstsc.exe
      "C:\Windows\system32\mstsc.exe"
      1⤵
      • Enumerates connected drives
      PID:1944
    • C:\Windows\system32\control.exe
      "C:\Windows\system32\control.exe" /name Microsoft.DefaultPrograms
      1⤵
        PID:2924
      • C:\Windows\SysWOW64\DllHost.exe
        C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
        1⤵
          PID:2916

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\44\Browsers\Firefox\Bookmarks.txt

          Filesize

          105B

          MD5

          2e9d094dda5cdc3ce6519f75943a4ff4

          SHA1

          5d989b4ac8b699781681fe75ed9ef98191a5096c

          SHA256

          c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142

          SHA512

          d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7

        • C:\Users\Admin\AppData\Local\Temp\tmp8086.tmp.dat

          Filesize

          92KB

          MD5

          b9858d49711b377343dad7336af34a75

          SHA1

          807eee110edcaf45772bf902d32adfe72d7aa7e0

          SHA256

          29796e50a6e69754ef1bb64d0dd9ca2e657c8de2843e06d689c0b5125c9d3ce3

          SHA512

          9525413e6bf14f24f2dedccac36a153ddee2d88f3ee0ce87d8ac4cd3ea63d33fa439cf28d3e155e9e7be0d0856d0b01e2813dc67e890724c4cd71714490cff5d

        • C:\Users\Admin\Downloads\FreeRobux.exe

          Filesize

          1.2MB

          MD5

          3c0a10912d34140b0dcbbb6ddd982f56

          SHA1

          9c07774e8ce009629dbddb43fa73cb3f5dafe39b

          SHA256

          d3e166dfd64f0f5e63ef46ccf340937393242433a872d77d8d6afc974a8e6cfd

          SHA512

          c95140ef1abe995c210a620727db4e0627f2fda20d248a29c9216e96992f23096435ee248f3d2d69b71e4e9c4215e7ecf6048cc983142f67b371d7c35b15bb4b

        • C:\Users\Admin\Downloads\Setup.bat

          Filesize

          31B

          MD5

          7a1224f5b93470ba772698dba9bbc8dc

          SHA1

          5cbabe8cb347a350f75108efb101f7aa29f1ac6f

          SHA256

          5ea7797532c3ed291e4a9b5f40f07140ac073737bc280de5bc5fc1bf7dc90e99

          SHA512

          f6071c4edb7e7cc013cc8791c96b048672ca7eb71b0098ce5fa565309d8f9767e470b35b9172bfbaa6d42f91cb7792789828195c4f041e81066cbd8b45f61c05

        • \Users\Admin\Downloads\FreeRobux.sfx.exe

          Filesize

          1.6MB

          MD5

          a7ee48c9bc8343c20978cd2bb27648d5

          SHA1

          1667b8481a81965d494b349cbca761e443e00fa3

          SHA256

          7d0a0f28fb323e4c2432696be7d445da107407beee50cf29c0a28bacfa88c649

          SHA512

          4dad06de44c6e9cf7534c9164d70e9a3bc2340370784bc5b681e9c3f50e0438021efca8449da61ed9aacf8921d46d45849f66da3175ba0d07888157f66ee834c

        • memory/1876-114-0x0000000005590000-0x00000000055D0000-memory.dmp

          Filesize

          256KB

        • memory/1876-111-0x0000000000340000-0x00000000006EE000-memory.dmp

          Filesize

          3.7MB

        • memory/1876-113-0x0000000073F00000-0x00000000745EE000-memory.dmp

          Filesize

          6.9MB

        • memory/1876-112-0x0000000000340000-0x00000000006EE000-memory.dmp

          Filesize

          3.7MB

        • memory/1876-168-0x0000000000340000-0x00000000006EE000-memory.dmp

          Filesize

          3.7MB

        • memory/1876-169-0x0000000073F00000-0x00000000745EE000-memory.dmp

          Filesize

          6.9MB

        • memory/1944-170-0x00000000001A0000-0x00000000001A1000-memory.dmp

          Filesize

          4KB

        • memory/2688-102-0x0000000000C40000-0x0000000000FEE000-memory.dmp

          Filesize

          3.7MB

        • memory/2688-103-0x0000000073EE0000-0x00000000745CE000-memory.dmp

          Filesize

          6.9MB

        • memory/2688-35-0x0000000005DA0000-0x0000000005DE0000-memory.dmp

          Filesize

          256KB

        • memory/2688-33-0x0000000000C40000-0x0000000000FEE000-memory.dmp

          Filesize

          3.7MB

        • memory/2688-34-0x0000000073EE0000-0x00000000745CE000-memory.dmp

          Filesize

          6.9MB

        • memory/2688-32-0x0000000000C40000-0x0000000000FEE000-memory.dmp

          Filesize

          3.7MB