Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05-11-2024 21:11

General

  • Target

    123.scr

  • Size

    282KB

  • MD5

    9dc5e3d364fba20137971eb948ed5089

  • SHA1

    5848daad55e30e542e17213ea83d4c4e8ad66641

  • SHA256

    e009fee742f6dd1d2c9fc0e840dbeeca1a705a13c2667bf09daf216c60411e89

  • SHA512

    a0eac98d1b820b59fa2ed0ab98bd70b3fa96af2d0d1498f6ad2e23829f6d1852bbc7512d9683ed1985c4d221bada57461a65ea18556d48235d7a8f6a127eefa9

  • SSDEEP

    6144:if+BLtABPDMtBBfn1Y0gIoHOQpafTyUlI1D0fVg9MtW:JtVvgIoHOOZ1DKg96

Malware Config

Extracted

Family

44caliber

C2

https://discordapp.com/api/webhooks/1184504729359896607/fPAMX9PDaXX6cd_-7EdUwUPRgvGLKrETMXz361gwk0y19F6LqJJCESeLcwPQReg9mLu9

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\123.scr
    "C:\Users\Admin\AppData\Local\Temp\123.scr" /S
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2532

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\44\Process.txt

    Filesize

    366B

    MD5

    5a22b07e13204fbbe70b4ae8b2d2b228

    SHA1

    e7a8a2ff9f277e19da421c85248b7b0dc23684ef

    SHA256

    9ce16ae499366ef66625575d30bf4d34095ea735762156837235775a2241b655

    SHA512

    943052c6e86b0941bfde8d336af4abe35b234763e6a04eba37d8de72dfc8348de03bced92e07fc589f06d6b4a3e416ac994e121471869141c3b1db51c0f19692

  • C:\Users\Admin\AppData\Roaming\44\Process.txt

    Filesize

    433B

    MD5

    bfe70fc201f03307238c313ecbd6d1db

    SHA1

    d014d7436ad646defc169ef43fd1a5d71a7acd5f

    SHA256

    6676dbe21ca5f78d161a8057a16ae2240da5b74533de43a960f39f63fdc85c94

    SHA512

    f0ccc8f528cc846d30f356aeff5113df2150fbb6a9a30367664e20ecc04b3e63f596a34f756c0909439f151ed8bb268a938b0ae8304c69aec2694fc5df4ca925

  • memory/2532-0-0x000007FEF5413000-0x000007FEF5414000-memory.dmp

    Filesize

    4KB

  • memory/2532-1-0x0000000000FF0000-0x000000000103C000-memory.dmp

    Filesize

    304KB

  • memory/2532-4-0x000007FEF5410000-0x000007FEF5DFC000-memory.dmp

    Filesize

    9.9MB

  • memory/2532-52-0x000007FEF5410000-0x000007FEF5DFC000-memory.dmp

    Filesize

    9.9MB