Analysis
-
max time kernel
4294180s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20220223-en -
submitted
06-03-2022 12:31
Static task
static1
Behavioral task
behavioral1
Sample
bilds.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
bilds.exe
Resource
win10v2004-en-20220113
General
-
Target
bilds.exe
-
Size
913KB
-
MD5
d835eb128f02d253cea88ae97c9da23a
-
SHA1
e4d89e12aa6adb085c44cbf2891c295b87006b83
-
SHA256
32f8a09555626bf7f6fd52a4b98df62bad118c30f9e1b49269db497961cc7cd9
-
SHA512
fa80e1344c604c2b455484a528db4df00732eacd0fc5556422767f8847a2e4da8f0e5170b6a3ab70394605ac724f9a37cd44db37809d9cbf034210681c07ec62
Malware Config
Extracted
blackguard
https://api.telegram.org/bot1840568117:AAGlvKQeSfXkObSE7__yYc5jM9o8qSrkFUw/sendMessage?chat_id=1039923904
Signatures
-
BlackGuard
Infostealer first seen in Late 2021.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org 6 api.ipify.org -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 bilds.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier bilds.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe 1516 bilds.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1516 bilds.exe