Analysis
-
max time kernel
83s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
06-03-2022 12:32
Static task
static1
Behavioral task
behavioral1
Sample
bilds.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
bilds.exe
Resource
win10v2004-en-20220112
General
-
Target
bilds.exe
-
Size
1.1MB
-
MD5
7cadb3d6d6581c2bc3642653b9286b71
-
SHA1
ee3a164339db9e2441c035932ae382150f489fb1
-
SHA256
5293c26f29b4af6bc2f3f74ae1ed93537e6c311a695cc0a6920a635c57383617
-
SHA512
db01f9fd60532d121f493c9746dd846e220d8bb110b2bde52655f61a52d0b648f1bb28c7eda4d4c4ccc1066a0b77f7f476f4b558bde11d419abc6aed82f221e1
Malware Config
Extracted
blackguard
https://api.telegram.org/bot1840568117:AAGlvKQeSfXkObSE7__yYc5jM9o8qSrkFUw/sendMessage?chat_id=1039923904
Signatures
-
BlackGuard
Infostealer first seen in Late 2021.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 24 api.ipify.org 25 api.ipify.org 26 ip-api.com -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 bilds.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier bilds.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe 3788 bilds.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3788 bilds.exe