Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
06-03-2022 12:23
Static task
static1
Behavioral task
behavioral1
Sample
Soft.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
Soft.exe
Resource
win10v2004-en-20220113
General
-
Target
Soft.exe
-
Size
884KB
-
MD5
0c3b44ab12eaf59499daad1759989cdb
-
SHA1
333699f914fca9f8adeefc0da480515fd0598a06
-
SHA256
52bd68ea60e7171ed2413cd5292b74ac9872928a1a723405fb73ad57419c5bc6
-
SHA512
fa2295638da95eec258f173e5967cabd846920e0e7f3d717e3e67442892a33fbee46700cffc9f09d6fd7906051844b7e63462e3f700a88185a61af8bbc2df9c5
Malware Config
Signatures
-
BlackGuard
Infostealer first seen in Late 2021.
-
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation Soft.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation Soft.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation Soft.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation Soft.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation Soft.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation Soft.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation Soft.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 8 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 54 freegeoip.app 13 freegeoip.app 14 freegeoip.app 33 freegeoip.app 37 freegeoip.app 39 freegeoip.app 41 freegeoip.app 43 freegeoip.app -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 14 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Soft.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Soft.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Soft.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Soft.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Soft.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Soft.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Soft.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Soft.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Soft.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Soft.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Soft.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Soft.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Soft.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Soft.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe 1492 Soft.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 1492 Soft.exe Token: SeDebugPrivilege 1340 Soft.exe Token: SeDebugPrivilege 1752 Soft.exe Token: SeDebugPrivilege 2728 Soft.exe Token: SeDebugPrivilege 4988 Soft.exe Token: SeDebugPrivilege 1124 Soft.exe Token: SeDebugPrivilege 4124 Soft.exe Token: SeDebugPrivilege 4544 Soft.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1492 wrote to memory of 1340 1492 Soft.exe 86 PID 1492 wrote to memory of 1340 1492 Soft.exe 86 PID 1340 wrote to memory of 1752 1340 Soft.exe 89 PID 1340 wrote to memory of 1752 1340 Soft.exe 89 PID 1752 wrote to memory of 2728 1752 Soft.exe 92 PID 1752 wrote to memory of 2728 1752 Soft.exe 92 PID 2728 wrote to memory of 4988 2728 Soft.exe 93 PID 2728 wrote to memory of 4988 2728 Soft.exe 93 PID 4988 wrote to memory of 1124 4988 Soft.exe 94 PID 4988 wrote to memory of 1124 4988 Soft.exe 94 PID 1124 wrote to memory of 4124 1124 Soft.exe 99 PID 1124 wrote to memory of 4124 1124 Soft.exe 99 PID 4124 wrote to memory of 4544 4124 Soft.exe 100 PID 4124 wrote to memory of 4544 4124 Soft.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\Soft.exe"C:\Users\Admin\AppData\Local\Temp\Soft.exe"1⤵
- Checks computer location settings
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\Soft.exe"C:\Users\Admin\AppData\Local\Temp\Soft.exe"2⤵
- Checks computer location settings
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\Soft.exe"C:\Users\Admin\AppData\Local\Temp\Soft.exe"3⤵
- Checks computer location settings
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\Soft.exe"C:\Users\Admin\AppData\Local\Temp\Soft.exe"4⤵
- Checks computer location settings
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\Soft.exe"C:\Users\Admin\AppData\Local\Temp\Soft.exe"5⤵
- Checks computer location settings
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\Soft.exe"C:\Users\Admin\AppData\Local\Temp\Soft.exe"6⤵
- Checks computer location settings
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\Soft.exe"C:\Users\Admin\AppData\Local\Temp\Soft.exe"7⤵
- Checks computer location settings
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\Soft.exe"C:\Users\Admin\AppData\Local\Temp\Soft.exe"8⤵
- Suspicious use of AdjustPrivilegeToken
PID:4544
-
-
-
-
-
-
-