Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12-03-2024 15:13
Behavioral task
behavioral1
Sample
c3adcc3845887d661c5b1c83d2056f54.exe
Resource
win7-20240221-en
General
-
Target
c3adcc3845887d661c5b1c83d2056f54.exe
-
Size
252KB
-
MD5
c3adcc3845887d661c5b1c83d2056f54
-
SHA1
b9ee2a5e9c48e77662b3f1b72bf1c0c91a52acbf
-
SHA256
ca3c3aa03d433a067b297390a09bece2fd350813639e54dd97db18804e905a4c
-
SHA512
737d87e7cd1511f848bf46670926b418f3c6e285323ca9626073db5df787cfe762c5dd0fd96f67602b0e60f7f599a8e91ce2223b27bb9dda454ec72d41c5dcff
-
SSDEEP
3072:p77eMqu+6ju4ulnpsXMZ4jB/l3jAQ9iGbENKAZEi4Zr4Ekz1eaMjAmectmM3hI/5:ZeMu6A/ejB/hA2iGwREigc1z1eRbp5
Malware Config
Extracted
44caliber
https://discordapp.com/api/webhooks/879667505914843196/FSgcks9wUtWqypXECLPBNeh9fcBnYszBQiHHlUp3kPibjIkzQVY427-k4YdajckQ8QQK
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 6 freegeoip.app 8 freegeoip.app -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
c3adcc3845887d661c5b1c83d2056f54.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 c3adcc3845887d661c5b1c83d2056f54.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier c3adcc3845887d661c5b1c83d2056f54.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
c3adcc3845887d661c5b1c83d2056f54.exepid process 1996 c3adcc3845887d661c5b1c83d2056f54.exe 1996 c3adcc3845887d661c5b1c83d2056f54.exe 1996 c3adcc3845887d661c5b1c83d2056f54.exe 1996 c3adcc3845887d661c5b1c83d2056f54.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
c3adcc3845887d661c5b1c83d2056f54.exedescription pid process Token: SeDebugPrivilege 1996 c3adcc3845887d661c5b1c83d2056f54.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f7d34a90c7bc12d373b8ffe58f4663c0
SHA19cf0ea98d293d533f4f703e3165a64f0cdf508a5
SHA2565242a7cd066d81eabd18df7a997000b2d3cc8543116b6c3018a17be3073eed9d
SHA512d554d98746ee239295363db350d140d0e6c2f3837cff2321f4cb3e9464b106ad8f0fa9ed40b97f3b1d688e077060f53f9c10ee36da295ddc7ecf56ddc3184c5a