Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 15:22
Behavioral task
behavioral1
Sample
Updata.exe
Resource
win7-20231129-en
6 signatures
150 seconds
General
-
Target
Updata.exe
-
Size
303KB
-
MD5
fa8baa8b5f5e19777e1b20104defff51
-
SHA1
a17922c107c303693489530dbfa3bb20afc24e59
-
SHA256
42538f0378843cc317f37ff9731b8c917f6763d811c0fde29bac25b759402f47
-
SHA512
4e2478795dacfe440860f03c8b0e318f238b2d2e09e278c995b49a90415ff275c87645f3d22cbff6102e5db683d4d98f0ef13abb6002eb19c647f86ec8d69d62
-
SSDEEP
6144:4/oT6MDdbICydeBrdEGHpcJWbu6JmA1D0mGW:4/WJEGHpQWaa1DsW
Malware Config
Extracted
Family
44caliber
C2
https://discord.com/api/webhooks/1239246319751528579/IYIQqMQxDmDpiYnpeLyqY8m4ky9T5uSTQX5CVjPoiRejTrVzBHNdk_JlDhnNu15EaRmp
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1160 Updata.exe 1160 Updata.exe 1160 Updata.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1160 Updata.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1160 wrote to memory of 2784 1160 Updata.exe 28 PID 1160 wrote to memory of 2784 1160 Updata.exe 28 PID 1160 wrote to memory of 2784 1160 Updata.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Updata.exe"C:\Users\Admin\AppData\Local\Temp\Updata.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1160 -s 7202⤵PID:2784
-