Analysis

  • max time kernel
    107s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/03/2025, 00:25

General

  • Target

    Insidious.exe

  • Size

    274KB

  • MD5

    bd0abf4bc598b5ec4c2dc202130d1ca5

  • SHA1

    3c5e112efab2d799c84be216b2f79ae3842d670c

  • SHA256

    5ed924877d2133ba8cc49bcc184fc705ec7f245b48a1f1f6ea58efe27a8c9318

  • SHA512

    fd2cef1420136a77bb9d43cb69b088c19836df788ef4d4adb89a66ee2cd18511d05dd45510d7293caa3825cbc189dcce9aa2c1d131ee552f3fa9971bc842ddff

  • SSDEEP

    6144:3f+BLtABPDZU0/r7ePNztEObl/afTiylI1D003q:1ULFztEObPv1D3q

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/1352794031603712081/f-woauUxsO8FZ8GtPcSrZ_FxrccVOu_QXZdJAg8J3qgh9hizPxYvJ6Hq6QwtqH3P-wl6

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\Insidious.exe
    "C:\Users\Admin\AppData\Local\Temp\Insidious.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:5308

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\44\Process.txt

    Filesize

    832B

    MD5

    982f7be0f6fc6bc089613513e4dc652d

    SHA1

    8f4c658c465d049ef80814845e4d975691efb145

    SHA256

    5c8180829a75a6ebf6a50f78d1f8b7a3a356eb8895c66eaecdeb7b78ef63c5fb

    SHA512

    cba3c1d656f7da1e2305b0cac0765827eab355543e668f752f1d67ccc55b1b9a1a45958f24a9f4b951ab5054a9fe350c5f84613a873de968df3c45b04446be37

  • C:\Users\Admin\AppData\Roaming\44\Process.txt

    Filesize

    945B

    MD5

    7ff2a4a373accedecab31b37c1edb92b

    SHA1

    30b30c306423cd9036af99720a9069fe6bd3053f

    SHA256

    6a8048a630ac33dbc010d780aee9022ce8cb7ed49851b0f247281f2f3ad2bb17

    SHA512

    3443f7327e43d12b1c7eef645b0d3e10a8d3b94c8dc936935f66b2edd3a8287c459b111f3635d2739f3d97e3ee4054177d57e73d7398989df91f89520ed0e565

  • C:\Users\Admin\AppData\Roaming\44\Process.txt

    Filesize

    1KB

    MD5

    cd85174eaafeb31f3ecd4985386cad30

    SHA1

    3e6bf582fa4dab7f7a6ea8f0f3955657916f673f

    SHA256

    723d174ae88148561982b957f068418ec67c39af1c5d67e86f96cbd2e76decd9

    SHA512

    4a67f8be707f83966f28bfe97bf9a1bc3482d7ddfeeac3e39ea8c460ebee368f5effec85b267ee618b65ed5e05fa8a42d34232dda2e818a33f2ae1c135287641

  • memory/5308-0-0x00007FFFDD033000-0x00007FFFDD035000-memory.dmp

    Filesize

    8KB

  • memory/5308-1-0x0000019122C20000-0x0000019122C6A000-memory.dmp

    Filesize

    296KB

  • memory/5308-28-0x00007FFFDD030000-0x00007FFFDDAF1000-memory.dmp

    Filesize

    10.8MB

  • memory/5308-120-0x00007FFFDD030000-0x00007FFFDDAF1000-memory.dmp

    Filesize

    10.8MB