Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15-05-2024 09:05
Behavioral task
behavioral1
Sample
Insidious (1).exe
Resource
win7-20240221-en
6 signatures
150 seconds
General
-
Target
Insidious (1).exe
-
Size
303KB
-
MD5
c2aa5c9d7b5ff911e22255081dcd991c
-
SHA1
22d2d8232ba5c3aa91ff5afc3592a4714e03249f
-
SHA256
9e84d874ccf9ab7a3959c442928029571d1382a997ef76afca3ef9a12a16543b
-
SHA512
141ccd14cd6fbb43219c530fb20f29eca59fdfeea55fe631fae69ded6a662c08f7ea634f779f015780e32412f6a2dd21638ace83529fa41728d501158ad8cd8b
-
SSDEEP
6144:Wv1T6MDdbICydeBxbf0G3aLpbwsG6bmA1D0Kml:WvD10G3alsNg1Dcl
Malware Config
Extracted
Family
44caliber
C2
https://discordapp.com/api/webhooks/1239267922594103386/cJc3zwAObMx-1WV-HMX9of02O5QVNorkr4T9vAaYBfVmddGmj406b-kTsMGF0n8o8ovf
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2648 Insidious (1).exe 2648 Insidious (1).exe 2648 Insidious (1).exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2648 Insidious (1).exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2612 2648 Insidious (1).exe 28 PID 2648 wrote to memory of 2612 2648 Insidious (1).exe 28 PID 2648 wrote to memory of 2612 2648 Insidious (1).exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Insidious (1).exe"C:\Users\Admin\AppData\Local\Temp\Insidious (1).exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2648 -s 12162⤵PID:2612
-