Analysis

  • max time kernel
    118s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    24-03-2024 23:21

General

  • Target

    a8f8537dd994c6405a155144f0ea72f66f95e0beb94c64ace5dcede4e405e3d6.exe

  • Size

    274KB

  • MD5

    0f62fa73ab2574ad652247b0d0c1d53b

  • SHA1

    9755b759767a62ee6f0d188fc0713b7d9f4da6c2

  • SHA256

    a8f8537dd994c6405a155144f0ea72f66f95e0beb94c64ace5dcede4e405e3d6

  • SHA512

    ba726cac73b9c5a491ba74cb61731d90da54ee9d709d6f08ea9bde41f5bd4cb6013de4e1e068df7ea29b12a9bb6d2dbb0cef2585057722f4260faf0cfe34d698

  • SSDEEP

    6144:cf+BLtABPDLgj1xw1eO5rbMMzhgUsYqTXGR1afTyElI1D0uwX:n161eO5rbHHsYqTXG9p1D2X

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/1220750955448893500/rzVzB_J0mIM7yMj5hlY1HnUJ8dpAQ8Q15SDx6jq9JhiYRJikDTjetvA86KDH-S-q1sWM

Signatures

  • 44Caliber

    An open source infostealer written in C#.

  • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 2 IoCs
  • Detects executables Discord URL observed in first stage droppers 2 IoCs
  • Detects executables referencing Discord tokens regular expressions 2 IoCs
  • Detects executables referencing credit card regular expressions 2 IoCs
  • Detects executables referencing many VPN software clients. Observed in infosteslers 2 IoCs
  • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a8f8537dd994c6405a155144f0ea72f66f95e0beb94c64ace5dcede4e405e3d6.exe
    "C:\Users\Admin\AppData\Local\Temp\a8f8537dd994c6405a155144f0ea72f66f95e0beb94c64ace5dcede4e405e3d6.exe"
    1⤵
    • Checks processor information in registry
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:824

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\44\Process.txt

    Filesize

    444B

    MD5

    05d681f92e2def9bb92218e7b4198cf2

    SHA1

    b3a4d747b189b61f5b137561119b23111724f46e

    SHA256

    4bb56f9d8f8f3317fd67507f70d075f9cceb51e7eb604e81db03f9f7a749dd0b

    SHA512

    50e8d2d5b07ad906e7d3f8dc6b0602384f56911f35bf05d7d4b3daba49dbf715381c13a6d9992385255751bb1a8dccd9a61e2dd029168f673bfd6b23a632b27f

  • memory/824-0-0x0000000001250000-0x000000000129A000-memory.dmp

    Filesize

    296KB

  • memory/824-1-0x000007FEF6030000-0x000007FEF6A1C000-memory.dmp

    Filesize

    9.9MB

  • memory/824-2-0x000000001B6A0000-0x000000001B720000-memory.dmp

    Filesize

    512KB

  • memory/824-64-0x000007FEF6030000-0x000007FEF6A1C000-memory.dmp

    Filesize

    9.9MB