Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/02/2025, 10:14
Behavioral task
behavioral1
Sample
Insidious.exe
Resource
win7-20240903-en
7 signatures
300 seconds
General
-
Target
Insidious.exe
-
Size
303KB
-
MD5
7505682a058f45df956a6cdaa930af95
-
SHA1
dcf5b4a3de803af8361c85067605bd71d40035ba
-
SHA256
fe71bbfb6ea7f2373565eaccf6dc11ad16bf1f067da9bd22424e380fc14ff990
-
SHA512
c4f9b38610ed8a0503d2aa55ce4241537c75ee88b72abda1b3a87c911419c71cbe2a84a203c7624e24a453b1f975937c2360d7136535298499db778402c599d0
-
SSDEEP
6144:tRlT6MDdbICydeBV9suqPmlF62y6jmA1D0jCc:tRT4uqPmH6DY1DJc
Malware Config
Extracted
Family
44caliber
C2
https://discord.com/api/webhooks/1338073007217840141/eDeh4wwBxq9r_iLg9SoCkKAfiG9U5xZFSL0XqRVIuzLG3ldF3nrWp9gggQzPfh9skV6-
Signatures
-
44Caliber family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2228 Insidious.exe 2228 Insidious.exe 2228 Insidious.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2228 Insidious.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2924 2228 Insidious.exe 30 PID 2228 wrote to memory of 2924 2228 Insidious.exe 30 PID 2228 wrote to memory of 2924 2228 Insidious.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Insidious.exe"C:\Users\Admin\AppData\Local\Temp\Insidious.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2228 -s 10882⤵PID:2924
-