Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05-03-2024 13:00

General

  • Target

    b4c197aa74ab1aa8eb19e9f750643983.exe

  • Size

    844KB

  • MD5

    b4c197aa74ab1aa8eb19e9f750643983

  • SHA1

    fe4319509145df64949c4cd9d18185a9a04e8633

  • SHA256

    fb36313cba2e5e967fa201a8317176af31782119fc5d6b022c1c68c5996da8ee

  • SHA512

    a7cbe83a1b9f10595cfd8f542078e8230a9576935e9caa341f824fcc18bfd3eb6f2bedcb52683f88de6dcc7fc5573a72cbb4c1c9440c1cfede37c43b2f3a6fa3

  • SSDEEP

    12288:DmgwBRrWBuAYXe4/DJHXdziAreAjIETFrcfEOnR4nCSEmZh012EH5K9gJy5aAWdY:DmgwHW0AYvVXdzGETFI39J1q

Malware Config

Signatures

  • 44Caliber

    An open source infostealer written in C#.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b4c197aa74ab1aa8eb19e9f750643983.exe
    "C:\Users\Admin\AppData\Local\Temp\b4c197aa74ab1aa8eb19e9f750643983.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2188

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\44\Process.txt

    Filesize

    397B

    MD5

    7a4b2c64a9afe39da4b388f50ce02a53

    SHA1

    b1111ef841ed0559cdd9fad9602b541f09ce9534

    SHA256

    7b3e24db20b447027af8b28ef43effb99a2556f8f17c5409926e3cef5fc9c1fb

    SHA512

    3b4e66e5fc74926bd4bbde76879f26a65144c34968c38835a599eedb4841a582f371031d700068ea676ecad824e4d4a796dbd24a7630cc4537c06abea832524c

  • memory/2188-0-0x0000000001220000-0x00000000012FC000-memory.dmp

    Filesize

    880KB

  • memory/2188-1-0x000007FEF5560000-0x000007FEF5F4C000-memory.dmp

    Filesize

    9.9MB

  • memory/2188-2-0x00000000003D0000-0x00000000003D6000-memory.dmp

    Filesize

    24KB

  • memory/2188-3-0x00000000009B0000-0x0000000000A30000-memory.dmp

    Filesize

    512KB

  • memory/2188-49-0x000007FEF5560000-0x000007FEF5F4C000-memory.dmp

    Filesize

    9.9MB