Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
16-07-2024 04:06
Behavioral task
behavioral1
Sample
6602a6768c612807b54ad5e282106d80N.exe
Resource
win7-20240705-en
General
-
Target
6602a6768c612807b54ad5e282106d80N.exe
-
Size
303KB
-
MD5
6602a6768c612807b54ad5e282106d80
-
SHA1
554c249b0b54838ab326ced44234018e3d26f6a5
-
SHA256
fd0c25564e7fe0dbc2aa456defdbb4c8e4d3e6768adbc72462e9a3b48e63cb47
-
SHA512
f161c5a194abfbf43c9930b7f3e99b6b41edb4abc0520ee292fc6189ba95a9b87525526eb454e18537147e4bae51828a530155392628a8755c9a6d91691937d4
-
SSDEEP
6144:20tC6MDdbICydeB25aBRH5QreWQAKAKtBvUEWA1D0xYqnT:20q/BRH5QyYKZ1DwHnT
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1261337809793581077/th-zisFe-ONOBv0rIRsugBNZzyStJ-lRYkNoNm0Wd0XiY_0pKxTkCodWZeXwnZ-c_zi5
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
6602a6768c612807b54ad5e282106d80N.exepid Process 1988 6602a6768c612807b54ad5e282106d80N.exe 1988 6602a6768c612807b54ad5e282106d80N.exe 1988 6602a6768c612807b54ad5e282106d80N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
6602a6768c612807b54ad5e282106d80N.exedescription pid Process Token: SeDebugPrivilege 1988 6602a6768c612807b54ad5e282106d80N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
6602a6768c612807b54ad5e282106d80N.exedescription pid Process procid_target PID 1988 wrote to memory of 1392 1988 6602a6768c612807b54ad5e282106d80N.exe 31 PID 1988 wrote to memory of 1392 1988 6602a6768c612807b54ad5e282106d80N.exe 31 PID 1988 wrote to memory of 1392 1988 6602a6768c612807b54ad5e282106d80N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\6602a6768c612807b54ad5e282106d80N.exe"C:\Users\Admin\AppData\Local\Temp\6602a6768c612807b54ad5e282106d80N.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1988 -s 8202⤵PID:1392
-