Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30-11-2024 19:27

General

  • Target

    Insidious.exe

  • Size

    302KB

  • MD5

    777e0fd76dce46c05e55564d8465632f

  • SHA1

    05ca2a12ca319d20d8dfd64d46a88f88ec2a9a97

  • SHA256

    eff592526e32ba395227cc4521588f2a3858583d66e652af84b4a5346b8104c2

  • SHA512

    179365a7766653bd3de2f06304fbc25cb4dcac31edde723735cecd1a2f531b4692c4b9430a1f68832192f12494c6199a3e3fa6531cd09b67ff981d38cd8d7f90

  • SSDEEP

    6144:ARlT6MDdbICydeBV9suqPmlF62Yr8RmA1D0+Tf:ART4uqPmH68b1DBf

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/1262786010446696519/TF6h3fODHclXs66DoTWXW06HBQRMNnQ8AtN7KAb1UQJyUlcMqh_TPBHkwcOcPFBUoC1q

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\Insidious.exe
    "C:\Users\Admin\AppData\Local\Temp\Insidious.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\44\Process.txt

    Filesize

    290B

    MD5

    c556b61d48ef3b520160596d00f95c8f

    SHA1

    1fa7efbae61527ca92a4b6588fa5379c00a4ed7c

    SHA256

    c211ead87bb4e352b3565294a2de7d01452f07ccae031ce068b785a8bb1519cb

    SHA512

    bedb640e9adcd247fb1f098a35cbb3d2b17fe6f21a444bdf7ad155a3fef9903d2157299e7a713925385ea636488c6efb5fe12ed91ffb716184e6467804dbdfb5

  • C:\Users\Admin\AppData\Local\44\Process.txt

    Filesize

    420B

    MD5

    217c68335eca6253f43ea3e454957c85

    SHA1

    0eff2dae7863a9285a23916398011a21b450f743

    SHA256

    8ac8d643d64248ed0f3955023d261419aa02e18b0f2a0312843bafc2d848be24

    SHA512

    f0a7faf277e2386fdfe79148631f475ef35a44029b4a6148680517a5cdcb6354fa81a4c8e3242b83d2a0cd0dd22b9c8a703a30f5756ea74d0922af2277a7c203

  • memory/1984-0-0x000007FEF5E13000-0x000007FEF5E14000-memory.dmp

    Filesize

    4KB

  • memory/1984-1-0x0000000000FE0000-0x0000000001032000-memory.dmp

    Filesize

    328KB

  • memory/1984-20-0x000007FEF5E10000-0x000007FEF67FC000-memory.dmp

    Filesize

    9.9MB

  • memory/1984-52-0x000007FEF5E10000-0x000007FEF67FC000-memory.dmp

    Filesize

    9.9MB