Analysis
-
max time kernel
99s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
27/02/2025, 02:21
Behavioral task
behavioral1
Sample
14a1264513387d0de5b2ff845e9f87281c541454f3602195bd4722071c9cd993.exe
Resource
win7-20240903-en
General
-
Target
14a1264513387d0de5b2ff845e9f87281c541454f3602195bd4722071c9cd993.exe
-
Size
274KB
-
MD5
7a083b21373fd2434499809259fde79b
-
SHA1
76a4435b5d6962ac5075ab5f6da961c3ec8b69c9
-
SHA256
14a1264513387d0de5b2ff845e9f87281c541454f3602195bd4722071c9cd993
-
SHA512
bc1ccfa81f536f05870030b681a090b867bdb2ac557bd136590566a7c1b0487f9360d59d765dddc017ed0a1b611df8bdc08ad3e50c167a968b3a7168f38056b0
-
SSDEEP
6144:Sf+BLtABPDtFxzerToNZrOGy4xlc41V6GIeyXsRA1D0F+t:AFfNZrOR4EY69eyXd1DXt
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/882489630065319956/VC0YwvBy87naF4ORGT57s3TAJyA-YLmF9HH8KTWMAMdx5J5HhF5egYZOK_c3-xXSTcUg
Signatures
-
44Caliber family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 freegeoip.app 4 freegeoip.app -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 14a1264513387d0de5b2ff845e9f87281c541454f3602195bd4722071c9cd993.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 14a1264513387d0de5b2ff845e9f87281c541454f3602195bd4722071c9cd993.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3744 14a1264513387d0de5b2ff845e9f87281c541454f3602195bd4722071c9cd993.exe 3744 14a1264513387d0de5b2ff845e9f87281c541454f3602195bd4722071c9cd993.exe 3744 14a1264513387d0de5b2ff845e9f87281c541454f3602195bd4722071c9cd993.exe 3744 14a1264513387d0de5b2ff845e9f87281c541454f3602195bd4722071c9cd993.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3744 14a1264513387d0de5b2ff845e9f87281c541454f3602195bd4722071c9cd993.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\14a1264513387d0de5b2ff845e9f87281c541454f3602195bd4722071c9cd993.exe"C:\Users\Admin\AppData\Local\Temp\14a1264513387d0de5b2ff845e9f87281c541454f3602195bd4722071c9cd993.exe"1⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
592B
MD5d35569992803f817b8df880860a7b8b4
SHA129c4a42b796837bb7f13fbe6aaf0b2a3e79054d4
SHA256663cb8a0607e3306fda37f6a007e03694ed70d6bf752824077e670d97948d855
SHA51263db175a8d397b67c311e7639e2087d1cf4ada426f3664b84fb2ddbac784d6be7ce965eaa51ef3104ccbcdeb0584c302fc575b19bb50bee49da4e3d6b2ee6587
-
Filesize
730B
MD574e058142119b6655f7a780b7b7a31b8
SHA1752a2440b4a3f32df38d31850622dd2e8626cce8
SHA2569a20925f204c8eb60c1ad73825d305b59f215ffcb3c2f0cc7c21dd6844e78ee9
SHA512e39307a8de191aec178091388cf4c239e79b1aef14b8e7a6ad3562cc54d684d2169c3d478ff11c2ba093054b0fff8154ca25ce6827a7697ee79542d22d5001b1
-
Filesize
1KB
MD545371a1f9b2ea64ec454ab6b6cccda66
SHA143f7ce12b7b1ce9c5b2479a4453dc3f3e4fb16cf
SHA256f5d380f5f7b126abedbd91b1f82df6eef634962f472880dbbb7ecc86a0f0c7ba
SHA512b56599b38534eec4d82e08d4719119a1bd22292eaa1dea987f2d3a92115bea7caab4ff8da6967fdbce49ebb766bc9ad12b08f9bac35367840ef91ffa5d3074b2