Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
17-03-2024 01:28
Behavioral task
behavioral1
Sample
1fde4c0ddc141022ae31beadbae65aca.exe
Resource
win7-20231129-en
windows7-x64
6 signatures
150 seconds
General
-
Target
1fde4c0ddc141022ae31beadbae65aca.exe
-
Size
303KB
-
MD5
1fde4c0ddc141022ae31beadbae65aca
-
SHA1
ad4767a9905590f29e588fde1cd19a124fa42ef4
-
SHA256
59a6f06a6c3fb38fea0456447ef4b2be6c32b66c5eee189df4dcd07b7802cfb6
-
SHA512
b1a8bbc8a876355a6f04b1e40112f1ec1931f3d6bbab7036f87d8661b025310cd854dd789ca19fe8052d003c234ba607f3d5e27581e333b160ad2a833a1d30f1
-
SSDEEP
6144:bb2T6MDdbICydeB4mAQG0yB5cqVsvurTbmI1D0rAC:bb8HAQG0yXcsTR1DVC
Malware Config
Extracted
Family
44caliber
C2
https://discordapp.com/api/webhooks/1218245532355395716/g11t27knevSG81QEKAU9x-8eGlSzRRXTzD3cakygbS3BZNqW4JAN5zponvMiNKqlhNYv
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1364 1fde4c0ddc141022ae31beadbae65aca.exe 1364 1fde4c0ddc141022ae31beadbae65aca.exe 1364 1fde4c0ddc141022ae31beadbae65aca.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1364 1fde4c0ddc141022ae31beadbae65aca.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1364 wrote to memory of 2632 1364 1fde4c0ddc141022ae31beadbae65aca.exe 28 PID 1364 wrote to memory of 2632 1364 1fde4c0ddc141022ae31beadbae65aca.exe 28 PID 1364 wrote to memory of 2632 1364 1fde4c0ddc141022ae31beadbae65aca.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1fde4c0ddc141022ae31beadbae65aca.exe"C:\Users\Admin\AppData\Local\Temp\1fde4c0ddc141022ae31beadbae65aca.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1364 -s 11802⤵PID:2632
-