Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20250207-en
  • resource tags

    arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system
  • submitted
    15/02/2025, 22:09

General

  • Target

    9260b031bc5e822b632335447698e4a0d4df98f2be89c750b16e6567a1c852b0.exe

  • Size

    274KB

  • MD5

    b48e2f9b558ecdaaeaeef4016d44ae7d

  • SHA1

    88780ab2c40ebc2cb1d28f960e6bbc73159938f4

  • SHA256

    9260b031bc5e822b632335447698e4a0d4df98f2be89c750b16e6567a1c852b0

  • SHA512

    2827d7a391efe484f9b53a9f542f2ed3cc628c455d8206e5d6cdf7cb37ac38d1df0d2c9c57c9e15ab3352b7afc7e9d57a64e9094b8f5f8b7e08b1dbbba250307

  • SSDEEP

    6144:Wf+BLtABPDkkZ68Dm6pwyUruui8XafTyClI1D0vDx+:xozqyUruuzf1DAx+

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/1338494455816130602/RfPMucy7qNgnF1KO1MI5iOATLOqPdaYE1pn3HhuPCtXjqRXs3t1NFhCJsYBUYOc2mSD5

Signatures

  • 44Caliber

    An open source infostealer written in C#.

  • 44Caliber family
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9260b031bc5e822b632335447698e4a0d4df98f2be89c750b16e6567a1c852b0.exe
    "C:\Users\Admin\AppData\Local\Temp\9260b031bc5e822b632335447698e4a0d4df98f2be89c750b16e6567a1c852b0.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1628

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\44\Process.txt

    Filesize

    189B

    MD5

    9f7fd5431c05dbfd8c657af56010e775

    SHA1

    35426ebe297bf3e55edaec4bfc91d348a86204ff

    SHA256

    7b580e6a5e650e6d76b79dd4ea8bdbb6a3d245995671c8caeda9cdf9f7657c86

    SHA512

    bce9db6ac48eabeaa0d0436637a5e7a07d6e4fc67e5921c620324c0afb0fadbaa0fee4aafc208ec92a7b08044caf936da6c5e6a21c657321f5848a5a9080039a

  • C:\Users\Admin\AppData\Local\44\Process.txt

    Filesize

    475B

    MD5

    5163669b909a1b6b2c0ad4705e7eac69

    SHA1

    55eb93754710662c76631fe0f2049a49450d98e7

    SHA256

    1fdc65e773ef21030ec06ab2c4cc8fbca8957076473acaf37ea89d1a50160250

    SHA512

    1d10a9e64bda4bd6939b37fcf3100ba53261c442e32570972af1b9c345de60e9ea2a0d1a7933003c83c576a186f1ae655c1cafef44c0c28f09f861fee49997a0

  • memory/1628-0-0x000007FEF5403000-0x000007FEF5404000-memory.dmp

    Filesize

    4KB

  • memory/1628-1-0x00000000010D0000-0x000000000111A000-memory.dmp

    Filesize

    296KB

  • memory/1628-5-0x000007FEF5400000-0x000007FEF5DEC000-memory.dmp

    Filesize

    9.9MB

  • memory/1628-52-0x000007FEF5400000-0x000007FEF5DEC000-memory.dmp

    Filesize

    9.9MB