Analysis
-
max time kernel
137s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
26-03-2022 14:13
Static task
static1
Behavioral task
behavioral1
Sample
594871034a21bd98b9cfc059a07a9da3bf37b615c5dda3475ea764ec5c17e12f.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
594871034a21bd98b9cfc059a07a9da3bf37b615c5dda3475ea764ec5c17e12f.exe
Resource
win10v2004-en-20220113
General
-
Target
594871034a21bd98b9cfc059a07a9da3bf37b615c5dda3475ea764ec5c17e12f.exe
-
Size
522KB
-
MD5
1fd7eb65dad25aea119bd87f8d2318e6
-
SHA1
22678f48b00df28676210a6c6df88329e5378673
-
SHA256
594871034a21bd98b9cfc059a07a9da3bf37b615c5dda3475ea764ec5c17e12f
-
SHA512
015a422d05682750e05047231e4049002265733cebf8120624ba16f591541dd07b6d6d5e192c357ab807d990389c31dbb5eee619cd4c73b3850cc2fbb86ab791
Malware Config
Extracted
blackguard
https://api.telegram.org/bot1181007727:AAFOGOUZ_8YdXsZX1oMgQcNk6d5Kf87AP60/sendMessage?chat_id=553060588
Signatures
-
BlackGuard
Infostealer first seen in Late 2021.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3640 1996 WerFault.exe 79 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1996 594871034a21bd98b9cfc059a07a9da3bf37b615c5dda3475ea764ec5c17e12f.exe 1996 594871034a21bd98b9cfc059a07a9da3bf37b615c5dda3475ea764ec5c17e12f.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1996 594871034a21bd98b9cfc059a07a9da3bf37b615c5dda3475ea764ec5c17e12f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\594871034a21bd98b9cfc059a07a9da3bf37b615c5dda3475ea764ec5c17e12f.exe"C:\Users\Admin\AppData\Local\Temp\594871034a21bd98b9cfc059a07a9da3bf37b615c5dda3475ea764ec5c17e12f.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1996 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1996 -s 7722⤵
- Program crash
PID:3640
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 404 -p 1996 -ip 19961⤵PID:3376