Analysis
-
max time kernel
14s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-02-2024 17:35
Behavioral task
behavioral1
Sample
Insidious.exe
Resource
win7-20240221-en
windows7-x64
6 signatures
60 seconds
General
-
Target
Insidious.exe
-
Size
303KB
-
MD5
221c6b9aa86f1d4cee7cbe632988bf16
-
SHA1
2ddc6f8c92e3dc7a86a6b2272ef0d0201b2d03dc
-
SHA256
e6c6b76459d51d9751fa0182b3f0694eb08b1f5bb4c157cb75539ef5c961ffb1
-
SHA512
b4b0bc4402c10deeee79c49d3c9df1ddfdd005b00e1ec88b5ceae5d584f7544f12780a5b29d390371c2f725d3f88dcce9152e1390553f81cea0d78f7c3847a66
-
SSDEEP
6144:q96T6MDdbICydeBsyxi+949u9EIpvur8mI1D0J1P:q9gDxi+eEEhq1DyP
Malware Config
Extracted
Family
44caliber
C2
https://discord.com/api/webhooks/1202366571322806313/CuWLCBlIcOwf4tZ5FEYUvIyU9xl3Wseqgg-gJqdPKSwKm0EZWHxKo1tLi3sdhgSMNxR9
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2152 Insidious.exe 2152 Insidious.exe 2152 Insidious.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2152 Insidious.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2152 wrote to memory of 2556 2152 Insidious.exe 28 PID 2152 wrote to memory of 2556 2152 Insidious.exe 28 PID 2152 wrote to memory of 2556 2152 Insidious.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Insidious.exe"C:\Users\Admin\AppData\Local\Temp\Insidious.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2152 -s 8962⤵PID:2556
-