Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12-03-2024 15:13
Behavioral task
behavioral1
Sample
c3adcc3845887d661c5b1c83d2056f54.exe
Resource
win7-20240221-en
General
-
Target
c3adcc3845887d661c5b1c83d2056f54.exe
-
Size
252KB
-
MD5
c3adcc3845887d661c5b1c83d2056f54
-
SHA1
b9ee2a5e9c48e77662b3f1b72bf1c0c91a52acbf
-
SHA256
ca3c3aa03d433a067b297390a09bece2fd350813639e54dd97db18804e905a4c
-
SHA512
737d87e7cd1511f848bf46670926b418f3c6e285323ca9626073db5df787cfe762c5dd0fd96f67602b0e60f7f599a8e91ce2223b27bb9dda454ec72d41c5dcff
-
SSDEEP
3072:p77eMqu+6ju4ulnpsXMZ4jB/l3jAQ9iGbENKAZEi4Zr4Ekz1eaMjAmectmM3hI/5:ZeMu6A/ejB/hA2iGwREigc1z1eRbp5
Malware Config
Extracted
44caliber
https://discordapp.com/api/webhooks/879667505914843196/FSgcks9wUtWqypXECLPBNeh9fcBnYszBQiHHlUp3kPibjIkzQVY427-k4YdajckQ8QQK
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 2 freegeoip.app 3 freegeoip.app -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
c3adcc3845887d661c5b1c83d2056f54.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 c3adcc3845887d661c5b1c83d2056f54.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier c3adcc3845887d661c5b1c83d2056f54.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
c3adcc3845887d661c5b1c83d2056f54.exepid process 2184 c3adcc3845887d661c5b1c83d2056f54.exe 2184 c3adcc3845887d661c5b1c83d2056f54.exe 2184 c3adcc3845887d661c5b1c83d2056f54.exe 2184 c3adcc3845887d661c5b1c83d2056f54.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
c3adcc3845887d661c5b1c83d2056f54.exedescription pid process Token: SeDebugPrivilege 2184 c3adcc3845887d661c5b1c83d2056f54.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
412B
MD523e628e423c17425af5a0658dbecb904
SHA1338f4beeb6e20a4c7547f88ef1ee1a8926960213
SHA2565f6d992717421350eb96aa52ffa4085273032fa61462a12b8920afccf0962156
SHA5122d8531b6924735649c51480ebdeaa4767560787620fe81c5fe6d20aed158de3b2a1b39fb84e6110828ab84a1875c97d1ed74216acd751436be8dab4dbe35b1ab