Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16/03/2025, 14:51
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20240903-en
7 signatures
150 seconds
General
-
Target
Setup.exe
-
Size
303KB
-
MD5
a7c46d89223aae0247743ad157d5bb99
-
SHA1
30d8138399a6ab984f6587dc59a5a872c3028b98
-
SHA256
226270f50c49bb830c26fea7aa4bdc98cc8543d5878227e0eaea717973bc0742
-
SHA512
6a439332ba8add9fb64c14232010793dbca3455743f73755980549fbf45137d4082e4158db9813b3e9489e47f55353869f1e58f9d425181aa11121cab534b922
-
SSDEEP
6144:tJFT6MDdbICydeB7jAm6XWjV/N5e6rmA1D0dQw:tJzXAm6XWh/CQ1Ddw
Malware Config
Extracted
Family
44caliber
C2
https://discord.com/api/webhooks/1248020250486902824/TkMj5f9npQC-r0dbczquh_D_SL4JTnEoHzVZ8lmRNJKNQq_i_S5ue4Gli64qNfMQUz7T
Signatures
-
44Caliber family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1568 Setup.exe 1568 Setup.exe 1568 Setup.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1568 Setup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1568 wrote to memory of 2364 1568 Setup.exe 30 PID 1568 wrote to memory of 2364 1568 Setup.exe 30 PID 1568 wrote to memory of 2364 1568 Setup.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1568 -s 11882⤵PID:2364
-