Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 15:22
Behavioral task
behavioral1
Sample
Updata.exe
Resource
win7-20231129-en
windows7-x64
6 signatures
150 seconds
General
-
Target
Updata.exe
-
Size
303KB
-
MD5
fa8baa8b5f5e19777e1b20104defff51
-
SHA1
a17922c107c303693489530dbfa3bb20afc24e59
-
SHA256
42538f0378843cc317f37ff9731b8c917f6763d811c0fde29bac25b759402f47
-
SHA512
4e2478795dacfe440860f03c8b0e318f238b2d2e09e278c995b49a90415ff275c87645f3d22cbff6102e5db683d4d98f0ef13abb6002eb19c647f86ec8d69d62
-
SSDEEP
6144:4/oT6MDdbICydeBrdEGHpcJWbu6JmA1D0mGW:4/WJEGHpQWaa1DsW
Malware Config
Extracted
Family
44caliber
C2
https://discord.com/api/webhooks/1239246319751528579/IYIQqMQxDmDpiYnpeLyqY8m4ky9T5uSTQX5CVjPoiRejTrVzBHNdk_JlDhnNu15EaRmp
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
Updata.exepid process 1160 Updata.exe 1160 Updata.exe 1160 Updata.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Updata.exedescription pid process Token: SeDebugPrivilege 1160 Updata.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Updata.exedescription pid process target process PID 1160 wrote to memory of 2784 1160 Updata.exe WerFault.exe PID 1160 wrote to memory of 2784 1160 Updata.exe WerFault.exe PID 1160 wrote to memory of 2784 1160 Updata.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Updata.exe"C:\Users\Admin\AppData\Local\Temp\Updata.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1160 -s 7202⤵PID:2784
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1160-0-0x000007FEF5413000-0x000007FEF5414000-memory.dmpFilesize
4KB
-
memory/1160-1-0x0000000000AD0000-0x0000000000B22000-memory.dmpFilesize
328KB
-
memory/1160-20-0x000007FEF5410000-0x000007FEF5DFC000-memory.dmpFilesize
9.9MB
-
memory/1160-21-0x000007FEF5410000-0x000007FEF5DFC000-memory.dmpFilesize
9.9MB