Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
06-03-2022 12:30
Static task
static1
Behavioral task
behavioral1
Sample
bilds.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
bilds.exe
Resource
win10v2004-en-20220112
General
-
Target
bilds.exe
-
Size
920KB
-
MD5
a2eb83b612f03802d77d0fa187fc15d4
-
SHA1
98467348a2cd31f5ec0bf79909d48798ba3d6409
-
SHA256
b287dcb70b7a9ed7025171572a96f1447efa6adf88cd30aba591270052acfe8b
-
SHA512
7ae166157f7595e8f203408a3ee1e46bd540345cbc9f19a27d31c5de7cf16cba12094aa63ed5831c1aa6ed59344d3362608bfce49b4670ff224a82b46bb0af79
Malware Config
Extracted
blackguard
https://api.telegram.org/bot1840568117:AAGlvKQeSfXkObSE7__yYc5jM9o8qSrkFUw/sendMessage?chat_id=1039923904
Signatures
-
BlackGuard
Infostealer first seen in Late 2021.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org 6 api.ipify.org -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 bilds.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier bilds.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe 1608 bilds.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1608 bilds.exe