Analysis

  • max time kernel
    15s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24/02/2025, 23:05 UTC

General

  • Target

    906fe0618157118c0f1eec481a47f61de2ea4fd114e0418859f4bf2fe44113af.exe

  • Size

    303KB

  • MD5

    fabbae0153826c2a65fc8c4030ff0658

  • SHA1

    2a2341bf99b2978c5a4f18507a23935e06b1f1bf

  • SHA256

    906fe0618157118c0f1eec481a47f61de2ea4fd114e0418859f4bf2fe44113af

  • SHA512

    d540a918507d97ed59f13e53ed7cbe98f87bbf9fbfc26810931f771849a103683517b5fcf54aa9d3fbe1e61f2d686306079e8616adfd71be736ae078d358f81c

  • SSDEEP

    6144:jT8T6MDdbICydeBbUoGYyo51ZfpvwrmA1D0oy9t:jTq4oGYys1ZxvK1Du9t

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/1339959928726749206/zR7gpRGAWJs7CmuNiEfi7k7GbCXcAzsDQ-VSd5Os1J81s8ySI7nGZ3Oh8tUO-0iIcgIC

Signatures

  • 44Caliber

    An open source infostealer written in C#.

  • 44Caliber family
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\906fe0618157118c0f1eec481a47f61de2ea4fd114e0418859f4bf2fe44113af.exe
    "C:\Users\Admin\AppData\Local\Temp\906fe0618157118c0f1eec481a47f61de2ea4fd114e0418859f4bf2fe44113af.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2236
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 2236 -s 1196
      2⤵
        PID:2724

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2236-0-0x000007FEF5DB3000-0x000007FEF5DB4000-memory.dmp

      Filesize

      4KB

    • memory/2236-1-0x0000000000D70000-0x0000000000DC2000-memory.dmp

      Filesize

      328KB

    • memory/2236-19-0x000007FEF5DB0000-0x000007FEF679C000-memory.dmp

      Filesize

      9.9MB

    • memory/2236-20-0x000007FEF5DB0000-0x000007FEF679C000-memory.dmp

      Filesize

      9.9MB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.