Analysis

  • max time kernel
    104s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/03/2025, 00:34

General

  • Target

    Release/Insidious.exe

  • Size

    274KB

  • MD5

    bd0abf4bc598b5ec4c2dc202130d1ca5

  • SHA1

    3c5e112efab2d799c84be216b2f79ae3842d670c

  • SHA256

    5ed924877d2133ba8cc49bcc184fc705ec7f245b48a1f1f6ea58efe27a8c9318

  • SHA512

    fd2cef1420136a77bb9d43cb69b088c19836df788ef4d4adb89a66ee2cd18511d05dd45510d7293caa3825cbc189dcce9aa2c1d131ee552f3fa9971bc842ddff

  • SSDEEP

    6144:3f+BLtABPDZU0/r7ePNztEObl/afTiylI1D003q:1ULFztEObPv1D3q

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/1352794031603712081/f-woauUxsO8FZ8GtPcSrZ_FxrccVOu_QXZdJAg8J3qgh9hizPxYvJ6Hq6QwtqH3P-wl6

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\Release\Insidious.exe
    "C:\Users\Admin\AppData\Local\Temp\Release\Insidious.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:5284

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\44\Process.txt

    Filesize

    440B

    MD5

    9a95f8d169ff6479e95342478ed81b1e

    SHA1

    0c45786e821e6252e574810bf64703c9b02a3905

    SHA256

    07537a6223e241a7925bd2f2f7fc0bf4569cbace3c86e0be0c7fc225fe5e28d7

    SHA512

    418c1aa5ed18f93fcd7290e5fdfb9d0f61dab57ea0d1adb5e7e71f6c173e5c4abc6c5ecab77c77011bab488d8384bc066f0bb994358825727f2ef7070538bc08

  • C:\Users\Admin\AppData\Local\44\Process.txt

    Filesize

    732B

    MD5

    fa37721ce98d97bf054f5e16d85e4aa9

    SHA1

    0bb978f3206cb5c046627dbe38128e03aef38b84

    SHA256

    e31d68c10d32223287c13e2fb503340a629834ffc214db7e415ca0f6c488bec1

    SHA512

    37b98ac0e710bb30769cd7a8ec8ea52e5cf1ec5fe36372d036e4741bec3e47f3eaa561e5dd87d203330049c9f3d76d16d3d161362a0bb189d8783e8eec5a784e

  • C:\Users\Admin\AppData\Local\44\Process.txt

    Filesize

    1KB

    MD5

    7f8395a63c2e13cda9c19f47604fdccb

    SHA1

    9b4de222f8c386f6890aa01f6be0b2a0ad16f690

    SHA256

    5d75cce32cf7d4e200262a1a751823a6d9970345dfdbed51980d1391f0f23261

    SHA512

    ec94507da8f6cc77dcdf38d8c07bc7504b030b51e5be4e9bde1d375f39f4165c7727993baef0ed51ed49303af6de7057929efc19dab95de3ebe602e89b151b07

  • memory/5284-0-0x00007FFC495C3000-0x00007FFC495C5000-memory.dmp

    Filesize

    8KB

  • memory/5284-1-0x00000230DF340000-0x00000230DF38A000-memory.dmp

    Filesize

    296KB

  • memory/5284-23-0x00007FFC495C0000-0x00007FFC4A081000-memory.dmp

    Filesize

    10.8MB

  • memory/5284-121-0x00007FFC495C0000-0x00007FFC4A081000-memory.dmp

    Filesize

    10.8MB