Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15-05-2024 09:05

General

  • Target

    Insidious (1).exe

  • Size

    303KB

  • MD5

    c2aa5c9d7b5ff911e22255081dcd991c

  • SHA1

    22d2d8232ba5c3aa91ff5afc3592a4714e03249f

  • SHA256

    9e84d874ccf9ab7a3959c442928029571d1382a997ef76afca3ef9a12a16543b

  • SHA512

    141ccd14cd6fbb43219c530fb20f29eca59fdfeea55fe631fae69ded6a662c08f7ea634f779f015780e32412f6a2dd21638ace83529fa41728d501158ad8cd8b

  • SSDEEP

    6144:Wv1T6MDdbICydeBxbf0G3aLpbwsG6bmA1D0Kml:WvD10G3alsNg1Dcl

Malware Config

Extracted

Family

44caliber

C2

https://discordapp.com/api/webhooks/1239267922594103386/cJc3zwAObMx-1WV-HMX9of02O5QVNorkr4T9vAaYBfVmddGmj406b-kTsMGF0n8o8ovf

Signatures

  • 44Caliber

    An open source infostealer written in C#.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Insidious (1).exe
    "C:\Users\Admin\AppData\Local\Temp\Insidious (1).exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2648
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 2648 -s 1216
      2⤵
        PID:2612

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Credential Access

    Unsecured Credentials

    2
    T1552

    Credentials In Files

    2
    T1552.001

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2648-0-0x000007FEF5A73000-0x000007FEF5A74000-memory.dmp
      Filesize

      4KB

    • memory/2648-1-0x00000000012C0000-0x0000000001312000-memory.dmp
      Filesize

      328KB

    • memory/2648-19-0x000007FEF5A70000-0x000007FEF645C000-memory.dmp
      Filesize

      9.9MB

    • memory/2648-20-0x000007FEF5A73000-0x000007FEF5A74000-memory.dmp
      Filesize

      4KB

    • memory/2648-21-0x000007FEF5A70000-0x000007FEF645C000-memory.dmp
      Filesize

      9.9MB