Resubmissions

26-06-2024 10:20

240626-mc9jdasfmr 10

26-06-2024 10:17

240626-mbemlssepl 10

Analysis

  • max time kernel
    141s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-06-2024 10:20

General

  • Target

    Loader.exe

  • Size

    304KB

  • MD5

    f896c2bfec649637e85c463e3a70b2a6

  • SHA1

    04d65945a3b79ee5b48a7e7e22fd24c8198fe332

  • SHA256

    d4917f32cf3755b07badf1179d6717d4f17618cb68184f0dda48f4a4bbb45376

  • SHA512

    0fed9a755f93198e795aac73aff0e17478cd51ffb9c19f80fdfdaf53374b32e2016bf83f0415f253b6f76e736cb36fad5269021d73972749c3d3d84206c6ebe0

  • SSDEEP

    6144:bFcT6MDdbICydeBvtCikGW9mhL8PzeVAOe044E:bFK1CikGemQHOeGE

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/1255437795820966010/0VVoLF2QZxnBkoGw_P4ovEIbuHZLKgsoVU8zu2nEJgchI5ahmWwv98_frx1Jjvk7GNic

Signatures

  • 44Caliber

    An open source infostealer written in C#.

  • BlackGuard

    Infostealer first seen in Late 2021.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Loader.exe
    "C:\Users\Admin\AppData\Local\Temp\Loader.exe"
    1⤵
    • Adds Run key to start application
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4752
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1348 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:2040

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\44\Process.txt

      Filesize

      1KB

      MD5

      e7159eade1b782a240ddb6ecbb442953

      SHA1

      b5093ece27e586f3cc41ffcdd168a9bd82dd5577

      SHA256

      a8dd9c4cca14d3c6b5a574efdaa8744d93f8cff4c5d9d7cf740eb563d5b1b3a4

      SHA512

      4576eeae8a056a97b8bc0b31550dd455a518ac70b5cc255e1c4651b157a355b2271aa2d378a52c61e738898c6972ebf608db7d35450418ab95f71dbde58924b7

    • C:\Users\Admin\AppData\Roaming\44\Process.txt

      Filesize

      736B

      MD5

      cb54bace8a0022920baa81b29cabd60b

      SHA1

      b6bd354bca6e709223ff5a933d7ab463d317c4c2

      SHA256

      19ebe737ad8fd5abe998430d26349d3b16c49c39c8c65b94820ffbacfa8dc5fb

      SHA512

      a294a7369e440c5bb40288d5fd4b2f7ee60563ec1bc4d0f80ee335e9fc582e313c80e57985a80929da5aff11315e0ef0b3d79c7fa8d6615932a9662729c8e3c7

    • C:\Users\Admin\AppData\Roaming\44\Process.txt

      Filesize

      1KB

      MD5

      6feb2a04a06b4af553c6a612669d1133

      SHA1

      d091faf75dd9f2c53ce2a9af4cd8bd97ae10fb10

      SHA256

      4f1fbc50fefa00b9e7e2ae233ac25a8274c3257aca1651348450e479c5e27801

      SHA512

      2b4c9bedff8714ddd53af98833eb06ae814dd72be1ac6b914cf68b811fe7dd1d46cf5b283524e81b46925fd2c4058bcba1bf92874cae171e670565e2a0c85912

    • memory/4752-0-0x00007FFEAC103000-0x00007FFEAC105000-memory.dmp

      Filesize

      8KB

    • memory/4752-1-0x000001E1C5460000-0x000001E1C54B2000-memory.dmp

      Filesize

      328KB

    • memory/4752-2-0x00007FFEAC100000-0x00007FFEACBC1000-memory.dmp

      Filesize

      10.8MB

    • memory/4752-121-0x000001E1DF9A0000-0x000001E1DFAA2000-memory.dmp

      Filesize

      1.0MB

    • memory/4752-122-0x000001E1DFBF0000-0x000001E1DFD5A000-memory.dmp

      Filesize

      1.4MB

    • memory/4752-126-0x000001E1DFBF0000-0x000001E1DFD5A000-memory.dmp

      Filesize

      1.4MB

    • memory/4752-125-0x000001E1DF9A0000-0x000001E1DFAA2000-memory.dmp

      Filesize

      1.0MB

    • memory/4752-127-0x00007FFEAC100000-0x00007FFEACBC1000-memory.dmp

      Filesize

      10.8MB