Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-02-2025 13:42
Behavioral task
behavioral1
Sample
Loader.exe
Resource
win7-20240903-en
7 signatures
150 seconds
General
-
Target
Loader.exe
-
Size
303KB
-
MD5
06cefa8ca9d8b957ff7862c2bc095532
-
SHA1
00ddd5275d33b114891e8a1304f022cf31a3badc
-
SHA256
d6ff445d907d3cf0ca59cc2fa738de8b83f03c8bcb1420f425adf5b113fbdf38
-
SHA512
5e53b85ac8694cdcfab457a872811a5e42da18ab41de32b12d2ed28c32b9e4090c069833caf6fc9b02f9717314f5647027f85b506bea6ecf6f639d64c8d4aa90
-
SSDEEP
6144:uNFT6MDdbICydeBpxUKCa269TwHfw6fmA1D0H/s:uNzIKCa2yT301DUs
Malware Config
Extracted
Family
44caliber
C2
https://discord.com/api/webhooks/1338494455816130602/RfPMucy7qNgnF1KO1MI5iOATLOqPdaYE1pn3HhuPCtXjqRXs3t1NFhCJsYBUYOc2mSD5
Signatures
-
44Caliber family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2688 Loader.exe 2688 Loader.exe 2688 Loader.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2688 Loader.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2812 2688 Loader.exe 30 PID 2688 wrote to memory of 2812 2688 Loader.exe 30 PID 2688 wrote to memory of 2812 2688 Loader.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Loader.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2688 -s 11962⤵PID:2812
-