Analysis

  • max time kernel
    134s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    06-03-2022 12:27

General

  • Target

    bilds.exe

  • Size

    628KB

  • MD5

    f5ba22891326912d8f47c4fb5575d33b

  • SHA1

    7c237b720304f76362ea66f0d37ab502daf22b30

  • SHA256

    216c960ac6ef399e7ff33b18c03777237ced76d59ce0f8bb4d5f9a22e85b3bd8

  • SHA512

    b77eb3cd6e920e554bdb052e4bfc44e3f23358a29297cb37685ed9ba76aa3452d3eaf284b2542379a6770bfa84fd5fa1f702aff8714b64859c1b4ebb7906b4de

Malware Config

Extracted

Family

blackguard

C2

https://api.telegram.org/bot1840568117:AAGlvKQeSfXkObSE7__yYc5jM9o8qSrkFUw/sendMessage?chat_id=1039923904

Signatures

  • BlackGuard

    Infostealer first seen in Late 2021.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bilds.exe
    "C:\Users\Admin\AppData\Local\Temp\bilds.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1476

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1476-130-0x0000000074760000-0x0000000074F10000-memory.dmp

    Filesize

    7.7MB

  • memory/1476-131-0x00000000005D0000-0x0000000000672000-memory.dmp

    Filesize

    648KB

  • memory/1476-132-0x0000000005040000-0x00000000050A6000-memory.dmp

    Filesize

    408KB

  • memory/1476-133-0x0000000005030000-0x0000000005031000-memory.dmp

    Filesize

    4KB

  • memory/1476-134-0x00000000064D0000-0x0000000006562000-memory.dmp

    Filesize

    584KB