Analysis

  • max time kernel
    4294209s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20220310-en
  • submitted
    17-03-2022 07:01

General

  • Target

    db1499fa5ea0d7bc198609ef58218e8c95a63e19a4c59bcd5f6e81a0439beb1b.exe

  • Size

    456KB

  • MD5

    0ce6472a1caf1e18f0c87c6f405c6441

  • SHA1

    d6f0f1a7cfb43cadeace56f7624e3ca91bb46b8f

  • SHA256

    db1499fa5ea0d7bc198609ef58218e8c95a63e19a4c59bcd5f6e81a0439beb1b

  • SHA512

    5398f90b48a360f3ee4b8e5668f561fea209abdbdd426e58617d498257a4a204fb7a2687a771f1d907c3adee4b03511bb459ae6acec2401f6adf257a2e9be510

Malware Config

Extracted

Family

blackguard

C2

https://umpulumpu.ru/

Signatures

  • BlackGuard

    Infostealer first seen in Late 2021.

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\db1499fa5ea0d7bc198609ef58218e8c95a63e19a4c59bcd5f6e81a0439beb1b.exe
    "C:\Users\Admin\AppData\Local\Temp\db1499fa5ea0d7bc198609ef58218e8c95a63e19a4c59bcd5f6e81a0439beb1b.exe"
    1⤵
    • Adds Run key to start application
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1852
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping 1.1.1.1 -n 5 -w 5000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\db1499fa5ea0d7bc198609ef58218e8c95a63e19a4c59bcd5f6e81a0439beb1b.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:884
      • C:\Windows\system32\PING.EXE
        ping 1.1.1.1 -n 5 -w 5000
        3⤵
        • Runs ping.exe
        PID:1324
    • C:\Users\Admin\AppData\Local\Temp\tmp3C26.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp3C26.tmp.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:744
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 744 -s 1924
        3⤵
        • Program crash
        PID:1536

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dfb5638ad8d816371f5e8d087a5cdf16

    SHA1

    8c51ca99d022aff2ce7bcffdca6e178ca59ecb1e

    SHA256

    3c9e099a3967fa6efbe371b63d983da00071f69c464a47ed973f04b8d8fa1a91

    SHA512

    6b37a220fbd07642e089553ff5f8da90ec5ddb944c829153b03f4b87e4a058a071e547b94770709e545aaeea575b1bb4b997d70528fe0c99643c97adb07938d8

  • C:\Users\Admin\AppData\Local\Temp\tmp3C26.tmp.exe

    Filesize

    1.5MB

    MD5

    05d3edc56331ce405e49ad2fc4e6c01e

    SHA1

    0b0491f9b654bb0bc41929456ba2943141be6711

    SHA256

    ead17dee70549740a4e649a647516c140d303f507e0c42ac4b6856e6a4ff9e14

    SHA512

    b83c1d21147dce1eaadc5d066c0913ab2f08d1a97c34ffb2f4ee685d7f35979c3894b86bd4c2f470c0ae416aac3d9f57fe9d201721bdca2a64fbb9fff7857e26

  • C:\Users\Admin\AppData\Local\Temp\tmp3C26.tmp.exe

    Filesize

    1.5MB

    MD5

    05d3edc56331ce405e49ad2fc4e6c01e

    SHA1

    0b0491f9b654bb0bc41929456ba2943141be6711

    SHA256

    ead17dee70549740a4e649a647516c140d303f507e0c42ac4b6856e6a4ff9e14

    SHA512

    b83c1d21147dce1eaadc5d066c0913ab2f08d1a97c34ffb2f4ee685d7f35979c3894b86bd4c2f470c0ae416aac3d9f57fe9d201721bdca2a64fbb9fff7857e26

  • \Users\Admin\AppData\Local\Temp\x64\SQLite.Interop.dll

    Filesize

    1.6MB

    MD5

    616827a61d7a49ce5389c5d96443e35d

    SHA1

    d522ee5607e122e775d77641dba09711146db739

    SHA256

    54d4025bc175de5367d0ace1a78fec7edf06b642892691cf85afb02b8ab166d5

    SHA512

    fd6a53cb9851e56b8dc6a40627058852f2949688b73dacf6f3e0fcf932453b8c52a3bfefb12c80c38397a89f1038ad8fad329ea2798b86457ce5d8fe7ba87312

  • memory/744-62-0x0000000000CC0000-0x0000000000D14000-memory.dmp

    Filesize

    336KB

  • memory/744-69-0x000000001B006000-0x000000001B007000-memory.dmp

    Filesize

    4KB

  • memory/744-59-0x0000000000F30000-0x00000000010B6000-memory.dmp

    Filesize

    1.5MB

  • memory/744-61-0x000000001AFE0000-0x000000001AFE2000-memory.dmp

    Filesize

    8KB

  • memory/744-60-0x000007FEF5DA0000-0x000007FEF678C000-memory.dmp

    Filesize

    9.9MB

  • memory/744-63-0x000000001AFE6000-0x000000001B005000-memory.dmp

    Filesize

    124KB

  • memory/744-71-0x000000001B007000-0x000000001B009000-memory.dmp

    Filesize

    8KB

  • memory/744-65-0x000000001AD30000-0x000000001ADE0000-memory.dmp

    Filesize

    704KB

  • memory/744-66-0x000000001B005000-0x000000001B006000-memory.dmp

    Filesize

    4KB

  • memory/744-67-0x0000000000D10000-0x0000000000D72000-memory.dmp

    Filesize

    392KB

  • memory/744-70-0x000000001AF40000-0x000000001AF65000-memory.dmp

    Filesize

    148KB

  • memory/1852-54-0x000007FEF5DA0000-0x000007FEF678C000-memory.dmp

    Filesize

    9.9MB

  • memory/1852-55-0x0000000001140000-0x00000000011B8000-memory.dmp

    Filesize

    480KB

  • memory/1852-56-0x000000001B080000-0x000000001B082000-memory.dmp

    Filesize

    8KB