Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
103s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
22/03/2025, 00:26
General
-
Target
Release/Insidious.exe
-
Size
274KB
-
MD5
bd0abf4bc598b5ec4c2dc202130d1ca5
-
SHA1
3c5e112efab2d799c84be216b2f79ae3842d670c
-
SHA256
5ed924877d2133ba8cc49bcc184fc705ec7f245b48a1f1f6ea58efe27a8c9318
-
SHA512
fd2cef1420136a77bb9d43cb69b088c19836df788ef4d4adb89a66ee2cd18511d05dd45510d7293caa3825cbc189dcce9aa2c1d131ee552f3fa9971bc842ddff
-
SSDEEP
6144:3f+BLtABPDZU0/r7ePNztEObl/afTiylI1D003q:1ULFztEObPv1D3q
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1352794031603712081/f-woauUxsO8FZ8GtPcSrZ_FxrccVOu_QXZdJAg8J3qgh9hizPxYvJ6Hq6QwtqH3P-wl6
Signatures
-
44Caliber family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 freegeoip.app 6 freegeoip.app -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Insidious.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Insidious.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2192 Insidious.exe 2192 Insidious.exe 2192 Insidious.exe 2192 Insidious.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2192 Insidious.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
734B
MD5981a0216b3c430bee1a42d0f4dd8ab2c
SHA1f597ba45f08aabb2b8a52a648a2a16426069f934
SHA2561f137366ca398ab9ffe625d8eda3cd99ab3ac74d57bf1743562f221c7b455907
SHA512b783c3286f93b0d2d54b144993780266bc7c1bca5f8b5046785c1a47c48ec678ed17a6f8bbff0850e24943e0f1232ecc15ea62b0414967d9047dfe37734f3586
-
Filesize
1KB
MD5f9139f095b3c8b9322fbde4a0ff8ac1e
SHA1c08f324834497ebce0ece4c463d6070b9c38e720
SHA25607a142b693d2788089ca6900aa7129e5446d0750a8453f7fa69e6fddfc4712b5
SHA5129a8fa71b006e29ab4c11fafe80ee745135ef2d50a9e360242b172d134ab7923b609590fdbc09ba4c119d0822169e1179bbfc0700be5af7a6211934ea7f064509