Analysis
-
max time kernel
154s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08-03-2024 04:56
Static task
static1
Behavioral task
behavioral1
Sample
ba91e2cefca6e39537c09b39a52c0804.exe
Resource
win7-20240221-en
General
-
Target
ba91e2cefca6e39537c09b39a52c0804.exe
-
Size
3.1MB
-
MD5
ba91e2cefca6e39537c09b39a52c0804
-
SHA1
d7d5321eb7715a0333f8dba7b9525e6545832626
-
SHA256
daba765d0976cef05ea981ca8d722a047138a24f31fe318e8a3d550251dd703f
-
SHA512
25d859aff4bf32090eb10caf608e5cb46af5238a2183700b132e977e231f9195ac084db0cdf7508a923b32be817c73847817deec512eb01182277ac9ffcc39c8
-
SSDEEP
49152:+cSg4AV+b5KxOKezg2J0UxzklXUVYrvW9KbI9NBeqIX226txvAL66+U73:+/GV+IWlyUxdoIKONwqIX22ExhQ3
Malware Config
Extracted
44caliber
https://discordapp.com/api/webhooks/859014405580783637/J-rOLcLQORAp4rSIpre0H46Lhmzd8QK1hgRFNA4mqYSEz6dtJRq9HsK-id725NgqZTvK
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation ba91e2cefca6e39537c09b39a52c0804.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation release.exe -
Executes dropped EXE 2 IoCs
pid Process 4080 release.exe 4328 gg.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 30 freegeoip.app 31 freegeoip.app -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4328 gg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 gg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier gg.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000_Classes\Local Settings release.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4328 gg.exe 4328 gg.exe 4328 gg.exe 4328 gg.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4328 gg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4328 gg.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 848 wrote to memory of 3936 848 ba91e2cefca6e39537c09b39a52c0804.exe 90 PID 848 wrote to memory of 3936 848 ba91e2cefca6e39537c09b39a52c0804.exe 90 PID 848 wrote to memory of 3936 848 ba91e2cefca6e39537c09b39a52c0804.exe 90 PID 3936 wrote to memory of 4080 3936 cmd.exe 93 PID 3936 wrote to memory of 4080 3936 cmd.exe 93 PID 3936 wrote to memory of 4080 3936 cmd.exe 93 PID 4080 wrote to memory of 4328 4080 release.exe 94 PID 4080 wrote to memory of 4328 4080 release.exe 94 PID 4080 wrote to memory of 4328 4080 release.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba91e2cefca6e39537c09b39a52c0804.exe"C:\Users\Admin\AppData\Local\Temp\ba91e2cefca6e39537c09b39a52c0804.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\ggg.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\release.exerelease.exe -p2452344365463454336453324545365453354653446542345323455478523895473158069734897052390468947523089563⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\gg.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\gg.exe"4⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4328
-
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105B
MD52e9d094dda5cdc3ce6519f75943a4ff4
SHA15d989b4ac8b699781681fe75ed9ef98191a5096c
SHA256c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142
SHA512d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7
-
Filesize
1KB
MD5751968666a3e3106f48c69b443acb8b6
SHA1c2557a660c9e817ffb14fc15717ce3726697ec97
SHA256c8cbbaeb3929e11d8290ed271962d5f1babbc26123b51410a2a237f3abab9503
SHA5124588c500b1443683ca4db566bedc0aebc9e8982bf8439ad055c008da1e23f5df9ca876a4ea40ff0b6adc9e54900fe4a4594c63da4f81762b324174b6ea9a53ec
-
Filesize
1KB
MD5b21db7e62190762802a8a748e1d1e122
SHA16324ab18fb0211a3d5614ba0e5ab31be44805186
SHA256b99269db37cc5aaff515558a32f787fbc52ecdc8b25f33f27722212d671b5d3f
SHA512d3039d359c24f491aceb45122808b282bc8dc58c7aa5082fb9a0a302fcd4ac3460ef513b044157da990f9fd920e342dd510cae1b22a91ce99133e3f83e61f16a
-
Filesize
130B
MD549e54759168fb4e6b4f3e246b5e55a97
SHA13f39ba0a62772b0103dbb281336fbd1f789be2b6
SHA256ba587add159e65bceb36b3471b17325cb2698950e84856a36bcb0ee4ea22f489
SHA5124caffad6c4266f8973af47365d521c76fa2ee8065de07634bc290995ceeffe4071fdf1bcec0de4ff1085857a2cf7cdc5ceac0aebc03f452c71f742b285ab3719
-
Filesize
2.9MB
MD589c4b4680bad73c52aa1ffc8c857712f
SHA1e0cf85b6f27bd3b79147ed827c656df98da0f9cf
SHA25653031b91cd770308063cc46a2401988e9499cbee89717beb967448937c5bde1d
SHA5128f9bc4eee537cac5f32f965a0853af79df8502b0ea92db18a69033844edc34c6135fb25bbf369d83183ead1ab97708358b5d0b9f0bc94d209c0431bdff15f35c
-
Filesize
1.2MB
MD5117b28e18c3cdee58cee6f5b4c6b708b
SHA1bf3f7cf88712b01a8123d3836bf19f25b17a70ec
SHA256b356d0dfecf39874a2bbbe4cae33f580d91a8991860df23314f35950f574485c
SHA5123a2331e1f7266a262e308eab726ee43127631c7348e7931186d13f54577abb1a18a92d6a6664dc69a9cbe9098914bd0e6173d1adc634a545b9c87b3bedd600ea