Analysis

  • max time kernel
    104s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/04/2025, 02:01

General

  • Target

    1e72a9db792b1faa8009ccd252d261de.exe

  • Size

    2.1MB

  • MD5

    1e72a9db792b1faa8009ccd252d261de

  • SHA1

    cd449a868e9e2d5801d385e2c49aa19a67a6fd00

  • SHA256

    dd60d316ef472c3ef62493b316b46255f42730ef2d8f124533e3917027780312

  • SHA512

    400d3f24a941f7848ac80a53d31e29edd5c244779c0571d3a055de8e336dbd46e15a61ffd775487bcca0e03a5407b457e145da2617cd596ebca2401802d5fca1

  • SSDEEP

    24576:xALaiyQh8LwQGTv5fTU5eY3w8hih7ymAyVlpxbiL/90a0OxaHlnJO8gDh5am:xAyI8DGj5Y8n8PkbNXnJqN

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/1328443348104515634/LQkwHvZ5wgKz-NuXgc2vsxbqUucIFN9w5eOlOXBKfXJDOLaOJg5AXeztsablYQxwk5D3

Signatures

  • 44Caliber

    An open source infostealer written in C#.

  • 44Caliber family
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1e72a9db792b1faa8009ccd252d261de.exe
    "C:\Users\Admin\AppData\Local\Temp\1e72a9db792b1faa8009ccd252d261de.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4836
    • C:\Users\Admin\AppData\Local\Temp\decrypted.exe
      C:\Users\Admin\AppData\Local\Temp/decrypted.exe
      2⤵
      • Executes dropped EXE
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3892

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\decrypted.exe

    Filesize

    274KB

    MD5

    87c8398705c4db39e23971e1777b75f5

    SHA1

    e36ff9bd2936c613201409705be1ca2bb88d2852

    SHA256

    16efb9f03e55934143a9dd998aa207ec4d36d1a73508915b7b886585dcfe5863

    SHA512

    2e57f7bf63e290db6ed8b62f1161d9cb9b1cbc00f974c2a4b0bf150a9906ba6611b07386d4f6440422eed1fb8b4dcfc97683706dcdb41d8a4f93f558d1418c70

  • C:\Users\Admin\AppData\Roaming\44\Process.txt

    Filesize

    1KB

    MD5

    47027bdd3bf0d0bf6a00fc96187ee8eb

    SHA1

    516c483e044b35338a59861798f68b38854256f7

    SHA256

    a0e246e4745163c0b3e62403d5ef6a25e4c9d3b137081da9574bc80e378c5354

    SHA512

    1fbd2a9b0db7c6ee9c08a72556f8e5369ae41278bdbaf64807005f3cbbdfcff62a7e45f17ef516b9b0344d1207fa5d7cde93198df25f02d7e8a9591325be81e5

  • memory/3892-5-0x00007FFED6233000-0x00007FFED6235000-memory.dmp

    Filesize

    8KB

  • memory/3892-4-0x000001F3C7E20000-0x000001F3C7E6A000-memory.dmp

    Filesize

    296KB

  • memory/3892-34-0x00007FFED6230000-0x00007FFED6CF1000-memory.dmp

    Filesize

    10.8MB

  • memory/3892-127-0x000001F3E2590000-0x000001F3E2739000-memory.dmp

    Filesize

    1.7MB

  • memory/3892-128-0x00007FFED6230000-0x00007FFED6CF1000-memory.dmp

    Filesize

    10.8MB