Analysis

  • max time kernel
    150s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    06-03-2022 12:23

General

  • Target

    Soft.exe

  • Size

    884KB

  • MD5

    0c3b44ab12eaf59499daad1759989cdb

  • SHA1

    333699f914fca9f8adeefc0da480515fd0598a06

  • SHA256

    52bd68ea60e7171ed2413cd5292b74ac9872928a1a723405fb73ad57419c5bc6

  • SHA512

    fa2295638da95eec258f173e5967cabd846920e0e7f3d717e3e67442892a33fbee46700cffc9f09d6fd7906051844b7e63462e3f700a88185a61af8bbc2df9c5

Malware Config

Signatures

  • BlackGuard

    Infostealer first seen in Late 2021.

  • Checks computer location settings 2 TTPs 7 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Looks up external IP address via web service 8 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 14 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Soft.exe
    "C:\Users\Admin\AppData\Local\Temp\Soft.exe"
    1⤵
    • Checks computer location settings
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1492
    • C:\Users\Admin\AppData\Local\Temp\Soft.exe
      "C:\Users\Admin\AppData\Local\Temp\Soft.exe"
      2⤵
      • Checks computer location settings
      • Checks processor information in registry
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1340
      • C:\Users\Admin\AppData\Local\Temp\Soft.exe
        "C:\Users\Admin\AppData\Local\Temp\Soft.exe"
        3⤵
        • Checks computer location settings
        • Checks processor information in registry
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1752
        • C:\Users\Admin\AppData\Local\Temp\Soft.exe
          "C:\Users\Admin\AppData\Local\Temp\Soft.exe"
          4⤵
          • Checks computer location settings
          • Checks processor information in registry
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2728
          • C:\Users\Admin\AppData\Local\Temp\Soft.exe
            "C:\Users\Admin\AppData\Local\Temp\Soft.exe"
            5⤵
            • Checks computer location settings
            • Checks processor information in registry
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4988
            • C:\Users\Admin\AppData\Local\Temp\Soft.exe
              "C:\Users\Admin\AppData\Local\Temp\Soft.exe"
              6⤵
              • Checks computer location settings
              • Checks processor information in registry
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1124
              • C:\Users\Admin\AppData\Local\Temp\Soft.exe
                "C:\Users\Admin\AppData\Local\Temp\Soft.exe"
                7⤵
                • Checks computer location settings
                • Checks processor information in registry
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:4124
                • C:\Users\Admin\AppData\Local\Temp\Soft.exe
                  "C:\Users\Admin\AppData\Local\Temp\Soft.exe"
                  8⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4544

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1124-151-0x00007FFC2C5F0000-0x00007FFC2D0B1000-memory.dmp

    Filesize

    10.8MB

  • memory/1124-152-0x000000001B5D0000-0x000000001B5D2000-memory.dmp

    Filesize

    8KB

  • memory/1340-135-0x00007FFC2C5F0000-0x00007FFC2D0B1000-memory.dmp

    Filesize

    10.8MB

  • memory/1340-136-0x000000001B930000-0x000000001B932000-memory.dmp

    Filesize

    8KB

  • memory/1492-132-0x000000001B4D0000-0x000000001B4D2000-memory.dmp

    Filesize

    8KB

  • memory/1492-130-0x00000000006D0000-0x00000000007B2000-memory.dmp

    Filesize

    904KB

  • memory/1492-133-0x000000001D490000-0x000000001D616000-memory.dmp

    Filesize

    1.5MB

  • memory/1492-131-0x00007FFC2C5F0000-0x00007FFC2D0B1000-memory.dmp

    Filesize

    10.8MB

  • memory/1752-141-0x00007FFC2C5F0000-0x00007FFC2D0B1000-memory.dmp

    Filesize

    10.8MB

  • memory/1752-142-0x0000000000D50000-0x0000000000D52000-memory.dmp

    Filesize

    8KB

  • memory/2728-144-0x000000001B980000-0x000000001B982000-memory.dmp

    Filesize

    8KB

  • memory/2728-143-0x00007FFC2C5F0000-0x00007FFC2D0B1000-memory.dmp

    Filesize

    10.8MB

  • memory/4124-154-0x000000001BA70000-0x000000001BA72000-memory.dmp

    Filesize

    8KB

  • memory/4124-153-0x00007FFC2C5F0000-0x00007FFC2D0B1000-memory.dmp

    Filesize

    10.8MB

  • memory/4544-155-0x00007FFC2C5F0000-0x00007FFC2D0B1000-memory.dmp

    Filesize

    10.8MB

  • memory/4544-156-0x000000001B410000-0x000000001B412000-memory.dmp

    Filesize

    8KB

  • memory/4988-150-0x000000001B720000-0x000000001B722000-memory.dmp

    Filesize

    8KB

  • memory/4988-149-0x00007FFC2C5F0000-0x00007FFC2D0B1000-memory.dmp

    Filesize

    10.8MB