Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-10-2024 13:39
Behavioral task
behavioral1
Sample
Insidious.exe
Resource
win7-20240903-en
windows7-x64
6 signatures
150 seconds
General
-
Target
Insidious.exe
-
Size
303KB
-
MD5
665322163467881c0f67acdd516636ee
-
SHA1
f2aa4a06034ebb1a59682bcb793a57e9d32ab6f8
-
SHA256
e155fc44d621963f11e29a3a0441720e5182930d40291f9702fff148894426f5
-
SHA512
0bf5af0d13e1f52ac76b30209031c7457cac393c8f67dfd17c25b264b5d4ace82c4f48378d06de06b388d53ed063d700640b803dae62735a3c887973491d097f
-
SSDEEP
6144:oHhT6MDdbICydeBbWRIMmwKtptoF6vur0mI1D0RgQ:oHPJMmwKbtoji1DfQ
Malware Config
Extracted
Family
44caliber
C2
https://discord.com/api/webhooks/1209526085927051385/EtvkHonNgrd7_Ed8XhPqpGby3BdFMb-sGGbiEy1W1YNXV_phazAD5tPhlHZHRXpX8qqv
Signatures
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1992 Insidious.exe 1992 Insidious.exe 1992 Insidious.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1992 Insidious.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2780 1992 Insidious.exe 30 PID 1992 wrote to memory of 2780 1992 Insidious.exe 30 PID 1992 wrote to memory of 2780 1992 Insidious.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Insidious.exe"C:\Users\Admin\AppData\Local\Temp\Insidious.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1992 -s 11722⤵PID:2780
-