Analysis

  • max time kernel
    61s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    06-03-2022 12:45

General

  • Target

    cleaner.exe

  • Size

    4.3MB

  • MD5

    ef8385f6ccc6dc6aa6fa9833e13c1cf3

  • SHA1

    2fe6c0b8cef78d409d29fbd0d1260f39874b068e

  • SHA256

    5b8d0e358948f885ad1e6fa854f637c1e30036bc217f2c7f2579a8782d472cda

  • SHA512

    2efe1baab3b815baf2f45acca6afc3e2692cb2fa7e4806515f4376a43ad17f474551dcee87c03f65fe99ca553c79140ba6d35193753800bbeb0e3c27f2a9bbeb

Malware Config

Extracted

Family

blackguard

C2

https://api.telegram.org/bot1840568117:AAGlvKQeSfXkObSE7__yYc5jM9o8qSrkFUw/sendMessage?chat_id=1039923904

Signatures

  • BlackGuard

    Infostealer first seen in Late 2021.

  • Downloads MZ/PE file
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cleaner.exe
    "C:\Users\Admin\AppData\Local\Temp\cleaner.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2184
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 2184 -s 2260
      2⤵
      • Program crash
      PID:2880
  • C:\Windows\system32\WerFault.exe
    C:\Windows\system32\WerFault.exe -pss -s 200 -p 2184 -ip 2184
    1⤵
      PID:3736

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2184-130-0x000001B1A9E10000-0x000001B1AA25C000-memory.dmp

      Filesize

      4.3MB

    • memory/2184-131-0x00007FFC4F680000-0x00007FFC50141000-memory.dmp

      Filesize

      10.8MB

    • memory/2184-132-0x000001B1C5FC0000-0x000001B1C5FC2000-memory.dmp

      Filesize

      8KB

    • memory/2184-133-0x000001B1C6310000-0x000001B1C6360000-memory.dmp

      Filesize

      320KB

    • memory/2184-134-0x000001B1C5F60000-0x000001B1C5F82000-memory.dmp

      Filesize

      136KB