Overview
overview
10Static
static
10Game Setup v7.21.rar
windows7-x64
3Game Setup v7.21.rar
windows10-2004-x64
3Language/V...64.exe
windows7-x64
4Language/V...64.exe
windows10-2004-x64
4Mods/VC_re...64.exe
windows7-x64
4Mods/VC_re...64.exe
windows10-2004-x64
4Mods/redist.x64.exe
windows7-x64
4Mods/redist.x64.exe
windows10-2004-x64
4Setup.exe
windows7-x64
10Setup.exe
windows10-2004-x64
10updater.dll
windows7-x64
1updater.dll
windows10-2004-x64
1Analysis
-
max time kernel
24s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12-07-2024 21:56
Behavioral task
behavioral1
Sample
Game Setup v7.21.rar
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Game Setup v7.21.rar
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
Language/VC_redist.x64.exe
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
Language/VC_redist.x64.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
Mods/VC_redist.x64.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
Mods/VC_redist.x64.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
Mods/redist.x64.exe
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
Mods/redist.x64.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
Setup.exe
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
Setup.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
updater.dll
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
updater.dll
Resource
win10v2004-20240709-en
General
-
Target
Setup.exe
-
Size
303KB
-
MD5
72f66470e3d5246aff4f3c0d087000bb
-
SHA1
4cd6b127c956afddb8970b782437ea46032f7f13
-
SHA256
d5e0a56884a1952a28fd950adafe59d8f5fbee01fbdd168ca1fff76ec4e78b00
-
SHA512
7f517b91eba7aee75d79a24ac538f611c088b120bb5941d2644eae11ef4bd6d9378472cccef2e295f5c568a4523e8fca4c5361aad4699843ead80acb115a5185
-
SSDEEP
6144:FNFT6MDdbICydeBpxUKCa269TwHfg6rmA1D0Ns4:FNzIKCa2yTnQ1DN4
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1260880233582690385/u7lBtqkjz1LNC0PjQqZri3i3mPGZS7FL3A0shj3caD8BnnqHy-kpvGoX4WP18uYMS3Yh
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 304 Setup.exe 304 Setup.exe 304 Setup.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 304 Setup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 304 wrote to memory of 1996 304 Setup.exe 30 PID 304 wrote to memory of 1996 304 Setup.exe 30 PID 304 wrote to memory of 1996 304 Setup.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:304 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 304 -s 11922⤵PID:1996
-