Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/03/2025, 12:40
Behavioral task
behavioral1
Sample
Insidious.exe
Resource
win7-20240903-en
7 signatures
150 seconds
General
-
Target
Insidious.exe
-
Size
303KB
-
MD5
76479a85ccdb095400ce6f8e49f6f96c
-
SHA1
dfec26827b24892ba64c748bedfc48b8f83723fa
-
SHA256
077208157453c61a8e0e0595da78aaffac3731f594918cc0b7c2e75016b17812
-
SHA512
b77c51a9e24fc06384ed38dcff109a37e95076ccc80bc7a041e75f400ebca77a3cadab207df1f3048bd28193ed9425e3a4ce347f1da7adb3fb30b2d27f28e41e
-
SSDEEP
6144:Cb4T6MDdbICydeBrdcQG3yf51+/wjmA1D0phr:CbGhcQG3yB1aK1D8r
Malware Config
Extracted
Family
44caliber
C2
https://discord.com/api/webhooks/1300845993885171797/d6XLWleeGXHsZqUyCp-qA8LBbM-bHv706qhOGiaznpjmNKEE5oNNgdQn4SftKZB758x_
Signatures
-
44Caliber family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2516 Insidious.exe 2516 Insidious.exe 2516 Insidious.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2516 Insidious.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2516 wrote to memory of 2724 2516 Insidious.exe 30 PID 2516 wrote to memory of 2724 2516 Insidious.exe 30 PID 2516 wrote to memory of 2724 2516 Insidious.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Insidious.exe"C:\Users\Admin\AppData\Local\Temp\Insidious.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2516 -s 10722⤵PID:2724
-