Analysis

  • max time kernel
    96s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/03/2025, 07:23

General

  • Target

    de739e39b443896784ac47a54e6ff177aa1a0276972f8fcefefd89096feb324d.exe

  • Size

    274KB

  • MD5

    212e21699f779492a3d7258caae09adb

  • SHA1

    1a0ce654cfa010cc8fa134a7b51fa9cfe1a81f37

  • SHA256

    de739e39b443896784ac47a54e6ff177aa1a0276972f8fcefefd89096feb324d

  • SHA512

    53458096654ec266d5ca03d960d1a9178ea136d33db5d11fcd45aeafacd8613cc71214784a3c5a3fc064c2e6c521f5d0f5e570b5fc4fd94a3613cf33facb14fb

  • SSDEEP

    3072:pT59B82ObyQfpUdzd0v4HCmE2uiUSHSzNyS46sNDQgD3h6cAufDlCx8ieI/KQ73o:t5962fQebXCFD43WGRQkD05xq

Malware Config

Signatures

  • 44Caliber

    An open source infostealer written in C#.

  • 44Caliber family
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\de739e39b443896784ac47a54e6ff177aa1a0276972f8fcefefd89096feb324d.exe
    "C:\Users\Admin\AppData\Local\Temp\de739e39b443896784ac47a54e6ff177aa1a0276972f8fcefefd89096feb324d.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4844

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\44\Process.txt

    Filesize

    792B

    MD5

    6c38272795b9f61727fcb45a43c7f972

    SHA1

    b921a3523d9f771fbe674edbdc9b643f77e7122e

    SHA256

    00e3054cd02ae254ccd5b8135dd872293252f8ce8c82442043ad6d8dc3519e8d

    SHA512

    dbfaedd2f4ccef84d030ceea41843b7d28bddc24a94d6a794b796a6cc54d935de89d735c11552e9fa4393f24a6885834de5eb350c569bd820956e1d1e4bcdd37

  • C:\Users\Admin\AppData\Local\44\Process.txt

    Filesize

    1KB

    MD5

    40f94cb2dccf1f19b6bd90c3b9b948e3

    SHA1

    3ba206d3dc4510060f2efef657a0b2a744b308fd

    SHA256

    2f71b78d51df0033f826ac18d88d03752320722cdf2f963d273e3b63432e3503

    SHA512

    65aa4ad70ecb70679fd0c309bfac40523bb6c42d0c5742dff55d297f5cddaabb51eba1ba2d698c25c15f404dc06277d7e38bfeae499c46537898dd36980dd667

  • memory/4844-0-0x00007FF8DA963000-0x00007FF8DA965000-memory.dmp

    Filesize

    8KB

  • memory/4844-1-0x0000000000DA0000-0x0000000000DEA000-memory.dmp

    Filesize

    296KB

  • memory/4844-32-0x00007FF8DA960000-0x00007FF8DB421000-memory.dmp

    Filesize

    10.8MB

  • memory/4844-123-0x00007FF8DA960000-0x00007FF8DB421000-memory.dmp

    Filesize

    10.8MB