Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
25-12-2024 15:42
Behavioral task
behavioral1
Sample
Insidious.exe
Resource
win7-20241023-en
windows7-x64
7 signatures
150 seconds
General
-
Target
Insidious.exe
-
Size
303KB
-
MD5
fbf3ddca500a4965c99447ea7e79cf6d
-
SHA1
582ad8da1b4b136e1ccef53200f1920b9baa24b9
-
SHA256
2809f0c07efc9d7937f9a4c3c5b9ee7e950f859717f1223d61463c1064d91fbd
-
SHA512
e0bab8e7bcdb2b7ddda0738bc352082ed2bb522fba0c9346d0a52550b1b7f80d41d9764d5603ab9a778e4e92c07d6fd0abada87abe45e8befa04ef939ad13300
-
SSDEEP
6144:g5hxT6MDdbICydeBvQ26i2dVTZ86jmA1D0mCT:g5dY26i2vTGY1D4T
Malware Config
Extracted
Family
44caliber
C2
https://discord.com/api/webhooks/1321482296741859409/X1bn2jlvTd0y9AD60L8KRwYU6M1PtlXbovFDDG4UGVxu_AKL8j8gxu-Us5mRHlfUCPOy
Signatures
-
44Caliber family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2504 Insidious.exe 2504 Insidious.exe 2504 Insidious.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2504 Insidious.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2768 2504 Insidious.exe 30 PID 2504 wrote to memory of 2768 2504 Insidious.exe 30 PID 2504 wrote to memory of 2768 2504 Insidious.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Insidious.exe"C:\Users\Admin\AppData\Local\Temp\Insidious.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2504 -s 8682⤵PID:2768
-