Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
04-03-2022 14:17
Static task
static1
Behavioral task
behavioral1
Sample
Soft.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
Soft.exe
Resource
win10v2004-en-20220112
General
-
Target
Soft.exe
-
Size
1.2MB
-
MD5
eb6c563af372d1af92ac2b60438d076d
-
SHA1
9895725811ae5fda88629781daaa439c95a4976e
-
SHA256
67843d45ba538eca29c63c3259d697f7e2ba84a3da941295b9207cdb01c85b71
-
SHA512
e880144394cb5d7bbf8372c6eea88c288725651ba1ea4d52f38743cfc4278d52fa320f53eaedcc111781117436fd31897fc16d0e70e6b593c54a73bc405cca0f
Malware Config
Signatures
-
BlackGuard
Infostealer first seen in Late 2021.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 freegeoip.app 5 freegeoip.app -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Soft.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Soft.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1796 Soft.exe 1796 Soft.exe 1796 Soft.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1796 Soft.exe