Analysis

  • max time kernel
    125s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-05-2024 09:05

General

  • Target

    Insidious (1).exe

  • Size

    303KB

  • MD5

    c2aa5c9d7b5ff911e22255081dcd991c

  • SHA1

    22d2d8232ba5c3aa91ff5afc3592a4714e03249f

  • SHA256

    9e84d874ccf9ab7a3959c442928029571d1382a997ef76afca3ef9a12a16543b

  • SHA512

    141ccd14cd6fbb43219c530fb20f29eca59fdfeea55fe631fae69ded6a662c08f7ea634f779f015780e32412f6a2dd21638ace83529fa41728d501158ad8cd8b

  • SSDEEP

    6144:Wv1T6MDdbICydeBxbf0G3aLpbwsG6bmA1D0Kml:WvD10G3alsNg1Dcl

Malware Config

Extracted

Family

44caliber

C2

https://discordapp.com/api/webhooks/1239267922594103386/cJc3zwAObMx-1WV-HMX9of02O5QVNorkr4T9vAaYBfVmddGmj406b-kTsMGF0n8o8ovf

Signatures

  • 44Caliber

    An open source infostealer written in C#.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Insidious (1).exe
    "C:\Users\Admin\AppData\Local\Temp\Insidious (1).exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:748
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=1284,i,1697479186275492802,18058102846092193784,262144 --variations-seed-version --mojo-platform-channel-handle=3744 /prefetch:8
    1⤵
      PID:1728

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Credential Access

    Unsecured Credentials

    2
    T1552

    Credentials In Files

    2
    T1552.001

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/748-0-0x0000025C1C620000-0x0000025C1C672000-memory.dmp
      Filesize

      328KB

    • memory/748-1-0x00007FFBF7EF3000-0x00007FFBF7EF5000-memory.dmp
      Filesize

      8KB

    • memory/748-31-0x00007FFBF7EF0000-0x00007FFBF89B1000-memory.dmp
      Filesize

      10.8MB

    • memory/748-32-0x00007FFBF7EF0000-0x00007FFBF89B1000-memory.dmp
      Filesize

      10.8MB