Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
23/02/2025, 20:16
Static task
static1
Behavioral task
behavioral1
Sample
c75b299ee8d5af6943de2b98cd9d36389cf7f98cd36e68239afd520e5bbfec52.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
c75b299ee8d5af6943de2b98cd9d36389cf7f98cd36e68239afd520e5bbfec52.exe
Resource
win10v2004-20250217-en
General
-
Target
c75b299ee8d5af6943de2b98cd9d36389cf7f98cd36e68239afd520e5bbfec52.exe
-
Size
11.1MB
-
MD5
f43381c52c7d3eab6347894ff1bf6d35
-
SHA1
097a6a49f8ba7c10d7cc0ddca69c5c9036fc5213
-
SHA256
c75b299ee8d5af6943de2b98cd9d36389cf7f98cd36e68239afd520e5bbfec52
-
SHA512
bd05ef1fc7279445fa9ad50dd2400aaf7bc2643c5d13cabca20204afeaa77a4ac36c99395765ba85df3f401762ccf002327bd99d92018e9db669654ee3c5c874
-
SSDEEP
196608:fFqdGKeCIfqQq1QsKW7nSxXJQTMypF24oTq8MyuSIoQIwunHpm7oDvqU9rvJSHgB:MGKeCnQq1QsKC9TxYbJuSIo/f9r0gyM
Malware Config
Extracted
44caliber
https://discordapp.com/api/webhooks/1341705749000097873/Cm8XbJ9POoDIJFj-kHv4cNQ57rKrRSTTynrXpCZxyy6LbWHN-1RW5g-4NuUtr-gmtiFT
Signatures
-
44Caliber family
-
Executes dropped EXE 3 IoCs
pid Process 2084 1.exe 3008 2.exe 1188 2.exe -
Loads dropped DLL 11 IoCs
pid Process 2240 c75b299ee8d5af6943de2b98cd9d36389cf7f98cd36e68239afd520e5bbfec52.exe 3008 2.exe 1188 2.exe 1188 2.exe 1188 2.exe 1188 2.exe 1188 2.exe 1188 2.exe 1188 2.exe 1272 Process not Found 1272 Process not Found -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral1/files/0x0007000000016fe5-38.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2084 1.exe 2084 1.exe 2084 1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2084 1.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2084 2240 c75b299ee8d5af6943de2b98cd9d36389cf7f98cd36e68239afd520e5bbfec52.exe 30 PID 2240 wrote to memory of 2084 2240 c75b299ee8d5af6943de2b98cd9d36389cf7f98cd36e68239afd520e5bbfec52.exe 30 PID 2240 wrote to memory of 2084 2240 c75b299ee8d5af6943de2b98cd9d36389cf7f98cd36e68239afd520e5bbfec52.exe 30 PID 2084 wrote to memory of 3068 2084 1.exe 32 PID 2084 wrote to memory of 3068 2084 1.exe 32 PID 2084 wrote to memory of 3068 2084 1.exe 32 PID 2240 wrote to memory of 3008 2240 c75b299ee8d5af6943de2b98cd9d36389cf7f98cd36e68239afd520e5bbfec52.exe 33 PID 2240 wrote to memory of 3008 2240 c75b299ee8d5af6943de2b98cd9d36389cf7f98cd36e68239afd520e5bbfec52.exe 33 PID 2240 wrote to memory of 3008 2240 c75b299ee8d5af6943de2b98cd9d36389cf7f98cd36e68239afd520e5bbfec52.exe 33 PID 3008 wrote to memory of 1188 3008 2.exe 34 PID 3008 wrote to memory of 1188 3008 2.exe 34 PID 3008 wrote to memory of 1188 3008 2.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\c75b299ee8d5af6943de2b98cd9d36389cf7f98cd36e68239afd520e5bbfec52.exe"C:\Users\Admin\AppData\Local\Temp\c75b299ee8d5af6943de2b98cd9d36389cf7f98cd36e68239afd520e5bbfec52.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2084 -s 11963⤵PID:3068
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\2.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\2.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\2.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\2.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1188
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
303KB
MD507dd2a2a803e0bc5e994555565969fae
SHA180653c6680847c8bdf4d00345ff64747ec780673
SHA256255655c9809e1753b1629c6521f8ba40a9c528c47255cceb56d1739a0563b117
SHA51221216efc3b70f60323297246d4ccbdb54d79c81e605d26204382c55c44ae48d3a39debf58ebd75d5bdf634d7bcad9053b4ee26b90ef9f15233b7bec48abf68bf
-
Filesize
10.8MB
MD5a278b45805aed863e918605d95af8dc2
SHA150d745cc1aa8304245545211dd5399fee7a44c87
SHA2566ebf010667c22f096e4748d46a86967f130b01646349cbdadc43c9899b77da0f
SHA5127ecabf731a580444b46605e27477577d7ef0c76160592adb076643da2f2e8d2d9383317424405c35396fdbbcfcda2a16934d11eddda5ef0c6283559d6fb28920
-
Filesize
21KB
MD51c58526d681efe507deb8f1935c75487
SHA10e6d328faf3563f2aae029bc5f2272fb7a742672
SHA256ef13dce8f71173315dfc64ab839b033ab19a968ee15230e9d4d2c9d558efeee2
SHA5128edb9a0022f417648e2ece9e22c96e2727976332025c3e7d8f15bcf6d7d97e680d1bf008eb28e2e0bd57787dcbb71d38b2deb995b8edc35fa6852ab1d593f3d1
-
Filesize
18KB
MD5bfffa7117fd9b1622c66d949bac3f1d7
SHA1402b7b8f8dcfd321b1d12fc85a1ee5137a5569b2
SHA2561ea267a2e6284f17dd548c6f2285e19f7edb15d6e737a55391140ce5cb95225e
SHA512b319cc7b436b1be165cdf6ffcab8a87fe29de78f7e0b14c8f562be160481fb5483289bd5956fdc1d8660da7a3f86d8eede35c6cc2b7c3d4c852decf4b2dcdb7f
-
Filesize
21KB
MD5724223109e49cb01d61d63a8be926b8f
SHA1072a4d01e01dbbab7281d9bd3add76f9a3c8b23b
SHA2564e975f618df01a492ae433dff0dd713774d47568e44c377ceef9e5b34aad1210
SHA51219b0065b894dc66c30a602c9464f118e7f84d83010e74457d48e93aaca4422812b093b15247b24d5c398b42ef0319108700543d13f156067b169ccfb4d7b6b7c
-
Filesize
21KB
MD5517eb9e2cb671ae49f99173d7f7ce43f
SHA14ccf38fed56166ddbf0b7efb4f5314c1f7d3b7ab
SHA25657cc66bf0909c430364d35d92b64eb8b6a15dc201765403725fe323f39e8ac54
SHA512492be2445b10f6bfe6c561c1fc6f5d1af6d1365b7449bc57a8f073b44ae49c88e66841f5c258b041547fcd33cbdcb4eb9dd3e24f0924db32720e51651e9286be
-
Filesize
21KB
MD5d12403ee11359259ba2b0706e5e5111c
SHA103cc7827a30fd1dee38665c0cc993b4b533ac138
SHA256f60e1751a6ac41f08e46480bf8e6521b41e2e427803996b32bdc5e78e9560781
SHA5129004f4e59835af57f02e8d9625814db56f0e4a98467041da6f1367ef32366ad96e0338d48fff7cc65839a24148e2d9989883bcddc329d9f4d27cae3f843117d0
-
Filesize
5.8MB
MD5501080884bed38cb8801a307c9d7b7b4
SHA1881b250cc8f4fa4f75111ac557a4fde8e1e217af
SHA256bf68cf819a1e865170430c10e91c18b427aef88db1da1742020443864aa2b749
SHA51263d74a4871d1c72c2a79ae8a5d380070f9d2128c16949c3ad36c9862fcc4dab738137ed3d51caf0bc46b36655f8bd8a2d425d68200123415ee8d4de0e1cbebc9
-
Filesize
992KB
MD50e0bac3d1dcc1833eae4e3e4cf83c4ef
SHA14189f4459c54e69c6d3155a82524bda7549a75a6
SHA2568a91052ef261b5fbf3223ae9ce789af73dfe1e9b0ba5bdbc4d564870a24f2bae
SHA512a45946e3971816f66dd7ea3788aacc384a9e95011500b458212dc104741315b85659e0d56a41570731d338bdf182141c093d3ced222c007038583ceb808e26fd