Analysis
-
max time kernel
148s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
27-06-2024 20:54
Static task
static1
Behavioral task
behavioral1
Sample
3f8c834a6f95f5128aa4c916bbb51afcfe7d1c6e79e93b9c750862fbacf8d657.exe
Resource
win7-20240221-en
General
-
Target
3f8c834a6f95f5128aa4c916bbb51afcfe7d1c6e79e93b9c750862fbacf8d657.exe
-
Size
3.4MB
-
MD5
5c48167b9b7f4ca64ec8ffc3dac52f4f
-
SHA1
798c3b6432e0a6c7ca3565847f2ae6132ce273e2
-
SHA256
3f8c834a6f95f5128aa4c916bbb51afcfe7d1c6e79e93b9c750862fbacf8d657
-
SHA512
41d9dfe7e15f372e271b87bb1c28a16af7259d5dd76fe9e1d936de8ef34200504afb4a505d6c96722fc2c29c6a032fa81f094ae1969d13f4f55bdcf8ed2faace
-
SSDEEP
98304:U3GZi+althnATSq/Mr0E6QpT3WF/zYpDLGf8xV3XVV4l94e/YjW:U3G0+althATSCil3acME/6L/T
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1250616070168121415/5zPJF3YAMfzIYMNhBy0XbjWdMsVRmd5PNYzbuTK55XQkKeKyHmQ5hnEfKgffl6GKC84q
Signatures
-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 2 IoCs
Processes:
resource yara_rule behavioral2/files/0x000800000002338f-14.dat INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/2152-23-0x00000000004F0000-0x00000000006CC000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers -
Detects executables Discord URL observed in first stage droppers 2 IoCs
Processes:
resource yara_rule behavioral2/files/0x000800000002338f-14.dat INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/2152-23-0x00000000004F0000-0x00000000006CC000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL -
Detects executables packed with ConfuserEx Mod 2 IoCs
Processes:
resource yara_rule behavioral2/files/0x0008000000023389-27.dat INDICATOR_EXE_Packed_ConfuserEx behavioral2/memory/2152-30-0x0000000005CD0000-0x00000000060D6000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx -
Detects executables referencing Discord tokens regular expressions 2 IoCs
Processes:
resource yara_rule behavioral2/files/0x000800000002338f-14.dat INDICATOR_SUSPICIOUS_EXE_Discord_Regex behavioral2/memory/2152-23-0x00000000004F0000-0x00000000006CC000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Discord_Regex -
Detects executables referencing credit card regular expressions 2 IoCs
Processes:
resource yara_rule behavioral2/files/0x000800000002338f-14.dat INDICATOR_SUSPICIOUS_EXE_CC_Regex behavioral2/memory/2152-23-0x00000000004F0000-0x00000000006CC000-memory.dmp INDICATOR_SUSPICIOUS_EXE_CC_Regex -
Detects executables referencing many VPN software clients. Observed in infosteslers 2 IoCs
Processes:
resource yara_rule behavioral2/files/0x000800000002338f-14.dat INDICATOR_SUSPICIOUS_EXE_References_VPN behavioral2/memory/2152-23-0x00000000004F0000-0x00000000006CC000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_VPN -
Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers 2 IoCs
Processes:
resource yara_rule behavioral2/files/0x000800000002338f-14.dat INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/2152-23-0x00000000004F0000-0x00000000006CC000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
3f8c834a6f95f5128aa4c916bbb51afcfe7d1c6e79e93b9c750862fbacf8d657.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Control Panel\International\Geo\Nation 3f8c834a6f95f5128aa4c916bbb51afcfe7d1c6e79e93b9c750862fbacf8d657.exe -
Executes dropped EXE 1 IoCs
Processes:
Loader.exepid Process 2152 Loader.exe -
Loads dropped DLL 4 IoCs
Processes:
Loader.exepid Process 2152 Loader.exe 2152 Loader.exe 2152 Loader.exe 2152 Loader.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 31 IoCs
Processes:
Loader.exepid Process 2152 Loader.exe 2152 Loader.exe 2152 Loader.exe 2152 Loader.exe 2152 Loader.exe 2152 Loader.exe 2152 Loader.exe 2152 Loader.exe 2152 Loader.exe 2152 Loader.exe 2152 Loader.exe 2152 Loader.exe 2152 Loader.exe 2152 Loader.exe 2152 Loader.exe 2152 Loader.exe 2152 Loader.exe 2152 Loader.exe 2152 Loader.exe 2152 Loader.exe 2152 Loader.exe 2152 Loader.exe 2152 Loader.exe 2152 Loader.exe 2152 Loader.exe 2152 Loader.exe 2152 Loader.exe 2152 Loader.exe 2152 Loader.exe 2152 Loader.exe 2152 Loader.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Loader.exedescription pid Process Token: SeDebugPrivilege 2152 Loader.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
Loader.exepid Process 2152 Loader.exe 2152 Loader.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
3f8c834a6f95f5128aa4c916bbb51afcfe7d1c6e79e93b9c750862fbacf8d657.exedescription pid Process procid_target PID 3496 wrote to memory of 2152 3496 3f8c834a6f95f5128aa4c916bbb51afcfe7d1c6e79e93b9c750862fbacf8d657.exe 89 PID 3496 wrote to memory of 2152 3496 3f8c834a6f95f5128aa4c916bbb51afcfe7d1c6e79e93b9c750862fbacf8d657.exe 89 PID 3496 wrote to memory of 2152 3496 3f8c834a6f95f5128aa4c916bbb51afcfe7d1c6e79e93b9c750862fbacf8d657.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f8c834a6f95f5128aa4c916bbb51afcfe7d1c6e79e93b9c750862fbacf8d657.exe"C:\Users\Admin\AppData\Local\Temp\3f8c834a6f95f5128aa4c916bbb51afcfe7d1c6e79e93b9c750862fbacf8d657.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Loader.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Loader.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4424,i,17949988676391029604,13756926835471203788,262144 --variations-seed-version --mojo-platform-channel-handle=4104 /prefetch:81⤵PID:3980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5bb9840f7382dd86e6b528da7eca4282e
SHA1312520506e7444ca7952fca5473b61ca18ea3a94
SHA25638c69a36a8add6d7f523719ec0909867e0a4f2df0041c0f654cdb49c6b716e3b
SHA5128018b864da28b383e127d209c458281eca62ddb6c74a97f9c225938f21f87a2833c9fc828123c8014b9b7b5b576fc7c9e827f1d873e511722876ee559e6ee1e7
-
Filesize
695KB
MD5195ffb7167db3219b217c4fd439eedd6
SHA11e76e6099570ede620b76ed47cf8d03a936d49f8
SHA256e1e27af7b07eeedf5ce71a9255f0422816a6fc5849a483c6714e1b472044fa9d
SHA51256eb7f070929b239642dab729537dde2c2287bdb852ad9e80b5358c74b14bc2b2dded910d0e3b6304ea27eb587e5f19db0a92e1cbae6a70fb20b4ef05057e4ac
-
Filesize
4.0MB
MD51582aa45d981e0e569c6e05698642b30
SHA1763506f312a186c55a04ef6a16ad7e867c394097
SHA25621eecaf504b7fe787a45f4aa8f8f36dacfc3ab1d75624dfb41827cdef2a9a589
SHA512278a7a4e2b9d82528200b9f92244db3f228187d15c36fd169deb927e343bc4d0bb29c9dba496f86558aea4f4deb44d1e47a41d5598c0b375d99ad9fbe99cec34