Analysis

  • max time kernel
    4294180s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20220223-en
  • submitted
    06-03-2022 12:18

General

  • Target

    cleaner.exe

  • Size

    2.6MB

  • MD5

    38892c681fbfba55e79f825cad8b0674

  • SHA1

    ee1e86add82844c30c003899ea819d5edcd07df3

  • SHA256

    76b90299713b5d4ffd3c92b2cd66b3de68148c3133f927dfa385b075fd00d5b1

  • SHA512

    4f013a16318f6b16cc1b1c38e0911d073752e1081a7f8f799cf2b192282d408a1a423eb8b11438685221e988b3c8e3f9be3d2e13b1e3d424a051691dbbe70b1c

Malware Config

Extracted

Family

blackguard

C2

https://api.telegram.org/bot1840568117:AAGlvKQeSfXkObSE7__yYc5jM9o8qSrkFUw/sendMessage?chat_id=1039923904

Signatures

  • BlackGuard

    Infostealer first seen in Late 2021.

  • Downloads MZ/PE file
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cleaner.exe
    "C:\Users\Admin\AppData\Local\Temp\cleaner.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1668
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 1668 -s 1952
      2⤵
      • Program crash
      PID:1996

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1668-54-0x0000000000E40000-0x00000000010E4000-memory.dmp

    Filesize

    2.6MB

  • memory/1668-55-0x000007FEF5DB0000-0x000007FEF679C000-memory.dmp

    Filesize

    9.9MB

  • memory/1668-56-0x000000001B0D0000-0x000000001B0D2000-memory.dmp

    Filesize

    8KB

  • memory/1668-57-0x000000001AAB0000-0x000000001AB2A000-memory.dmp

    Filesize

    488KB

  • memory/1668-58-0x000000001B270000-0x000000001B31A000-memory.dmp

    Filesize

    680KB

  • memory/1668-59-0x000000001B150000-0x000000001B1B4000-memory.dmp

    Filesize

    400KB