Analysis

  • max time kernel
    34s
  • max time network
    35s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-10-2024 09:02

General

  • Target

    Insidious.exe

  • Size

    303KB

  • MD5

    1667298a8a38e435c330d1decf48347a

  • SHA1

    8ed1c41d7a9c59a52edc6ad608229fbd7492c763

  • SHA256

    f89b8052ec6c4ab10a3332ab50b595cd675dc9043c308e0d37dc48cb6244bf72

  • SHA512

    07462881d2d10db571f7e21e6d0cf115a5dbbb88c0afd3a118d88ddae2d9600db9201900866ea9e4adf0eec1f614f2f15ddac6ef69fdc5a3074f9e94eb39b203

  • SSDEEP

    6144:zv1T6MDdbICydeBxbf0G3aLpbwsY6jmA1D0KJ6:zvD10G3alsbY1DL6

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/1294513700799123476/jcrDYM1wi5rgaYktzvL6L2nE50ZpJ-pdnRrXxz84NCLRYLPfCMN8DTOd97Uc_z3FKP5j

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\Insidious.exe
    "C:\Users\Admin\AppData\Local\Temp\Insidious.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1536

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1536-1-0x00007FFF612E3000-0x00007FFF612E5000-memory.dmp

    Filesize

    8KB

  • memory/1536-0-0x000002454DB20000-0x000002454DB72000-memory.dmp

    Filesize

    328KB

  • memory/1536-32-0x00007FFF612E0000-0x00007FFF61DA1000-memory.dmp

    Filesize

    10.8MB

  • memory/1536-33-0x00007FFF612E0000-0x00007FFF61DA1000-memory.dmp

    Filesize

    10.8MB