Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
31-12-2024 14:01
Behavioral task
behavioral1
Sample
bc45b7861276839bd565daa9c370722ddaee8969.exe
Resource
win7-20241010-en
windows7-x64
7 signatures
150 seconds
General
-
Target
bc45b7861276839bd565daa9c370722ddaee8969.exe
-
Size
303KB
-
MD5
568d4673286ea9b9c70d7a68351f5071
-
SHA1
bc45b7861276839bd565daa9c370722ddaee8969
-
SHA256
2fe37b360b2266297431b3ca5857efd07ffdfe88630f402a75cf3c3252e03808
-
SHA512
8d9eb7572c71bda79111b59bdd0e0fc4cec38d3bc591471269a2bf0655b13e82483d68b9fe4ff357176a36b27d7ae48361d052c0c8122e4572bef318b5acb0e1
-
SSDEEP
6144:Y5hxT6MDdbICydeBvQ26i2dVTZy6TmA1D0y6z:Y5dY26i2vT4o1DQz
Malware Config
Extracted
Family
44caliber
C2
https://discord.com/api/webhooks/1215365574050320435/Xs0uw6QCOgwmHxgulV8bRwClRHSPZDdcc_n9uVnaO_5U4aAeOP21GI-qx7kxwlSROYeG
Signatures
-
44Caliber family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2400 bc45b7861276839bd565daa9c370722ddaee8969.exe 2400 bc45b7861276839bd565daa9c370722ddaee8969.exe 2400 bc45b7861276839bd565daa9c370722ddaee8969.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2400 bc45b7861276839bd565daa9c370722ddaee8969.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2432 2400 bc45b7861276839bd565daa9c370722ddaee8969.exe 30 PID 2400 wrote to memory of 2432 2400 bc45b7861276839bd565daa9c370722ddaee8969.exe 30 PID 2400 wrote to memory of 2432 2400 bc45b7861276839bd565daa9c370722ddaee8969.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc45b7861276839bd565daa9c370722ddaee8969.exe"C:\Users\Admin\AppData\Local\Temp\bc45b7861276839bd565daa9c370722ddaee8969.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2400 -s 7282⤵PID:2432
-