Analysis
-
max time kernel
37s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
21-02-2024 11:12
Behavioral task
behavioral1
Sample
Insidious.exe
Resource
win7-20231215-en
windows7-x64
6 signatures
150 seconds
General
-
Target
Insidious.exe
-
Size
303KB
-
MD5
cd1ac5775cfc183e6ebfb9397f4ae3c7
-
SHA1
8937b324e8c47f3b858d6e56c3705a96d5cf5d40
-
SHA256
9b7e5212ceb95912f0776f8bd48eac1b1098e9807e8f27291a3ffdd592c4e974
-
SHA512
d26c95bb9ccad0b1b3195e23dfc5b9e8cfeba458c0605ddefae3d807545b024a09d70aeb6d6f0c9d04472124b0ff7f28744ca534f107be2a72c0ab4366826c78
-
SSDEEP
6144:YjFT6MDdbICydeB0iG54G4S+ZoHi63mA1D0LGC:YjzQ54G4SuoCU1DBC
Malware Config
Extracted
Family
44caliber
C2
https://discord.com/api/webhooks/1209815343875235840/T1sUleC88lxasrU1EpgCYPjJI1NBPf57Wdr3z0H9p3gJmNIVwOVbhzTSCb3qRBCKKNRj
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2112 Insidious.exe 2112 Insidious.exe 2112 Insidious.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2112 Insidious.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2804 2112 Insidious.exe 28 PID 2112 wrote to memory of 2804 2112 Insidious.exe 28 PID 2112 wrote to memory of 2804 2112 Insidious.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Insidious.exe"C:\Users\Admin\AppData\Local\Temp\Insidious.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2112 -s 8882⤵PID:2804
-