Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/02/2024, 15:47
Behavioral task
behavioral1
Sample
a6baa421094ae5561400c553c662bd17.exe
Resource
win7-20240221-en
General
-
Target
a6baa421094ae5561400c553c662bd17.exe
-
Size
253KB
-
MD5
a6baa421094ae5561400c553c662bd17
-
SHA1
7b049e54295e2816f33c53304d4b53b8b1a31a27
-
SHA256
f65ead2486253fc8f1ffb85322d3af078c3f0b59569e3ded89de0f510226015d
-
SHA512
fbbf4f3f9d3f5ef7e802601b9b125b46e54df1fc6c56ac6a08e98adef0518b2be845655b27d123a68f3647cfb4ce2014f005feeb618facf5bd440d21d1d03b83
-
SSDEEP
3072:XA7eUAkUo7+CJ+qppsXMpwJBzh3DGcZGGl6tj5rVgLZfzUGWg7w2zp1bCaKdOJ3K:weUAo5TxGJBzlGSGGEZgLxxEuCD
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/875024811489906738/CpyWbrHIQGqh718u5276J6WiFHZNZUgiY72o4Syy8xUjuJKn8uAQ0JGDBq6sXWEbGAnY
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 freegeoip.app 3 freegeoip.app -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier a6baa421094ae5561400c553c662bd17.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 a6baa421094ae5561400c553c662bd17.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2932 a6baa421094ae5561400c553c662bd17.exe 2932 a6baa421094ae5561400c553c662bd17.exe 2932 a6baa421094ae5561400c553c662bd17.exe 2932 a6baa421094ae5561400c553c662bd17.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2932 a6baa421094ae5561400c553c662bd17.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
265B
MD5a20cabed8a4f3e0c39d6ea9dae044f23
SHA1e25f22408037e2c9c7bae61796d4885bde29e977
SHA256fa9b05e324d7f81dfd65c2ad791c81988a0b42390acbac427a2177b15742c1c7
SHA512bc6907470f97daf1696c0a09d5886c37887c48f2a182797cf07fd7ae9f8bbb34434eec3259c0adb65fb787c181b91d2692f45958872fd0efd6a4bf6050f9a43d