Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
16-03-2024 10:21
Behavioral task
behavioral1
Sample
cdce543cd450caefdbb4a26d8166f6ed.exe
Resource
win7-20240220-en
General
-
Target
cdce543cd450caefdbb4a26d8166f6ed.exe
-
Size
281KB
-
MD5
cdce543cd450caefdbb4a26d8166f6ed
-
SHA1
20e0e1d618d285ca41b11d94615a4cd05bc896a6
-
SHA256
ab483f365d90ef57576d730e5386d3bd47deda47abfc1dc9bf3d71bb0044cfbe
-
SHA512
724424c2b888d15834543541b76f7c12e2cdf370076ea8131b5d5f4a7cc41796599a54a55eac5477848fe0ea3d9acf34c9ef8d7091cfa15fa682c2b9c52c66c0
-
SSDEEP
3072:KdH00+bxduBTyhNJU8g50X0psXd0MTHQqU/EbLIX+Fogj46tYZIkSiJOGA3hI/Ks:+4xduBOhNJVvQBILIX+FogjPYZTZ
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/765103913988784149/W5RQaou5OFSODUHo_pEb6-NGCPMx-yToLvIwdKe04A93TB7yZH7I2VNL839P5qrdt9tE
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
cdce543cd450caefdbb4a26d8166f6ed.exepid process 2552 cdce543cd450caefdbb4a26d8166f6ed.exe 2552 cdce543cd450caefdbb4a26d8166f6ed.exe 2552 cdce543cd450caefdbb4a26d8166f6ed.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
cdce543cd450caefdbb4a26d8166f6ed.exedescription pid process Token: SeDebugPrivilege 2552 cdce543cd450caefdbb4a26d8166f6ed.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cdce543cd450caefdbb4a26d8166f6ed.exedescription pid process target process PID 2552 wrote to memory of 2636 2552 cdce543cd450caefdbb4a26d8166f6ed.exe WerFault.exe PID 2552 wrote to memory of 2636 2552 cdce543cd450caefdbb4a26d8166f6ed.exe WerFault.exe PID 2552 wrote to memory of 2636 2552 cdce543cd450caefdbb4a26d8166f6ed.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cdce543cd450caefdbb4a26d8166f6ed.exe"C:\Users\Admin\AppData\Local\Temp\cdce543cd450caefdbb4a26d8166f6ed.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2552 -s 8242⤵PID:2636
-