Analysis
-
max time kernel
15s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24/02/2025, 23:05 UTC
Behavioral task
behavioral1
Sample
906fe0618157118c0f1eec481a47f61de2ea4fd114e0418859f4bf2fe44113af.exe
Resource
win7-20240903-en
General
-
Target
906fe0618157118c0f1eec481a47f61de2ea4fd114e0418859f4bf2fe44113af.exe
-
Size
303KB
-
MD5
fabbae0153826c2a65fc8c4030ff0658
-
SHA1
2a2341bf99b2978c5a4f18507a23935e06b1f1bf
-
SHA256
906fe0618157118c0f1eec481a47f61de2ea4fd114e0418859f4bf2fe44113af
-
SHA512
d540a918507d97ed59f13e53ed7cbe98f87bbf9fbfc26810931f771849a103683517b5fcf54aa9d3fbe1e61f2d686306079e8616adfd71be736ae078d358f81c
-
SSDEEP
6144:jT8T6MDdbICydeBbUoGYyo51ZfpvwrmA1D0oy9t:jTq4oGYys1ZxvK1Du9t
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1339959928726749206/zR7gpRGAWJs7CmuNiEfi7k7GbCXcAzsDQ-VSd5Os1J81s8ySI7nGZ3Oh8tUO-0iIcgIC
Signatures
-
44Caliber family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2236 906fe0618157118c0f1eec481a47f61de2ea4fd114e0418859f4bf2fe44113af.exe 2236 906fe0618157118c0f1eec481a47f61de2ea4fd114e0418859f4bf2fe44113af.exe 2236 906fe0618157118c0f1eec481a47f61de2ea4fd114e0418859f4bf2fe44113af.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2236 906fe0618157118c0f1eec481a47f61de2ea4fd114e0418859f4bf2fe44113af.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2724 2236 906fe0618157118c0f1eec481a47f61de2ea4fd114e0418859f4bf2fe44113af.exe 30 PID 2236 wrote to memory of 2724 2236 906fe0618157118c0f1eec481a47f61de2ea4fd114e0418859f4bf2fe44113af.exe 30 PID 2236 wrote to memory of 2724 2236 906fe0618157118c0f1eec481a47f61de2ea4fd114e0418859f4bf2fe44113af.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\906fe0618157118c0f1eec481a47f61de2ea4fd114e0418859f4bf2fe44113af.exe"C:\Users\Admin\AppData\Local\Temp\906fe0618157118c0f1eec481a47f61de2ea4fd114e0418859f4bf2fe44113af.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2236 -s 11962⤵PID:2724
-