Analysis

  • max time kernel
    4294180s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20220223-en
  • submitted
    06-03-2022 11:57

General

  • Target

    Leane.exe

  • Size

    3.9MB

  • MD5

    f2466bd74f1fd75ffc8289ec1120f24c

  • SHA1

    2041c34d882cd97d0006b6b17f464e71ae7abd67

  • SHA256

    ba2bc430c4661aab84cf7e8fedf2684e5fc106f7797af4553aef7490193b00a6

  • SHA512

    331c106326175840a3e595309434ab1c45f09173067bb612fb82b5bdc42fa1edffb57c3ac39758f3613170938e39cf9bcdc44bee149aa331637e7c9a5b611c45

Malware Config

Extracted

Family

blackguard

C2

https://api.telegram.org/bot1840568117:AAGlvKQeSfXkObSE7__yYc5jM9o8qSrkFUw/sendMessage?chat_id=1039923904

Signatures

  • BlackGuard

    Infostealer first seen in Late 2021.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Leane.exe
    "C:\Users\Admin\AppData\Local\Temp\Leane.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1252
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 1252 -s 976
      2⤵
      • Program crash
      PID:596

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1252-54-0x0000000001100000-0x00000000014F8000-memory.dmp

    Filesize

    4.0MB

  • memory/1252-55-0x000007FEF6010000-0x000007FEF69FC000-memory.dmp

    Filesize

    9.9MB

  • memory/1252-56-0x0000000001030000-0x00000000010AA000-memory.dmp

    Filesize

    488KB

  • memory/1252-57-0x000000001B130000-0x000000001B132000-memory.dmp

    Filesize

    8KB

  • memory/1252-58-0x000000001BD70000-0x000000001BE20000-memory.dmp

    Filesize

    704KB

  • memory/1252-59-0x000000001B250000-0x000000001B2B2000-memory.dmp

    Filesize

    392KB