Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19-08-2024 10:51
Behavioral task
behavioral1
Sample
Insidious.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Insidious.exe
Resource
win10v2004-20240802-en
General
-
Target
Insidious.exe
-
Size
303KB
-
MD5
73f91b648c6e449c678cc4bcaf217651
-
SHA1
8cb0cec0e31531b73bc04630c0ef86aec11894e6
-
SHA256
f2b5cbbdb4beb4ccfe4220af1bc7a1065524ee4dcad89fa180ccd3a4cac0d87a
-
SHA512
a2ad7c032bb93a9dc32a243cc0febb6fbe4272d44f381f6e9f2be7e94aca30a7b9871e9dd2a67f48b98202351605d81e5416e4c1d76275d590eba575bf8b006f
-
SSDEEP
6144:TRlT6MDdbICydeBV9suqPmlF62y6bmA1D0Gsp:TRT4uqPmH6Dg1Dmp
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1275043194824032316/eqfjpwfw-Aa32DfOOcp2pilYlVMwJCH973ItNa5eap8KHs1eapnkS0U23LDUza9Imjji
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2352 Insidious.exe 2352 Insidious.exe 2352 Insidious.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2352 Insidious.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2352 wrote to memory of 2720 2352 Insidious.exe 31 PID 2352 wrote to memory of 2720 2352 Insidious.exe 31 PID 2352 wrote to memory of 2720 2352 Insidious.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Insidious.exe"C:\Users\Admin\AppData\Local\Temp\Insidious.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2352 -s 10162⤵PID:2720
-