Resubmissions
29-03-2022 22:33
220329-2ghzjsgchj 10Analysis
-
max time kernel
4294179s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
29-03-2022 22:33
Static task
static1
Behavioral task
behavioral1
Sample
b16bb8ce89c42e0f48deb5ba2a8b5c7495c8702c7c2c5c0af7d38739f6281ebb.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
b16bb8ce89c42e0f48deb5ba2a8b5c7495c8702c7c2c5c0af7d38739f6281ebb.exe
Resource
win10v2004-20220310-en
General
-
Target
b16bb8ce89c42e0f48deb5ba2a8b5c7495c8702c7c2c5c0af7d38739f6281ebb.exe
-
Size
989KB
-
MD5
118886bd493a37257b963fe26805f516
-
SHA1
2f61fcbebaca2ffe7b41a63adefad83ec04fb94b
-
SHA256
b16bb8ce89c42e0f48deb5ba2a8b5c7495c8702c7c2c5c0af7d38739f6281ebb
-
SHA512
c3753e98a9e2a70fec6d9573c74c70af665e82b5234bfb4ba7fa9a4160b255c3fa2a1328e41ec3d7569bdbd02e078e84181007d4b8f7818c6acf9c67c1157628
Malware Config
Signatures
-
BlackGuard
Infostealer first seen in Late 2021.
-
Executes dropped EXE 2 IoCs
pid Process 560 AnimeSoftware.exe 624 Natasha.exe -
Loads dropped DLL 8 IoCs
pid Process 1564 b16bb8ce89c42e0f48deb5ba2a8b5c7495c8702c7c2c5c0af7d38739f6281ebb.exe 1564 b16bb8ce89c42e0f48deb5ba2a8b5c7495c8702c7c2c5c0af7d38739f6281ebb.exe 1564 b16bb8ce89c42e0f48deb5ba2a8b5c7495c8702c7c2c5c0af7d38739f6281ebb.exe 1564 b16bb8ce89c42e0f48deb5ba2a8b5c7495c8702c7c2c5c0af7d38739f6281ebb.exe 1564 b16bb8ce89c42e0f48deb5ba2a8b5c7495c8702c7c2c5c0af7d38739f6281ebb.exe 1564 b16bb8ce89c42e0f48deb5ba2a8b5c7495c8702c7c2c5c0af7d38739f6281ebb.exe 1564 b16bb8ce89c42e0f48deb5ba2a8b5c7495c8702c7c2c5c0af7d38739f6281ebb.exe 1564 b16bb8ce89c42e0f48deb5ba2a8b5c7495c8702c7c2c5c0af7d38739f6281ebb.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2012 624 WerFault.exe 28 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 624 Natasha.exe 624 Natasha.exe 624 Natasha.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 624 Natasha.exe Token: SeDebugPrivilege 560 AnimeSoftware.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1564 wrote to memory of 560 1564 b16bb8ce89c42e0f48deb5ba2a8b5c7495c8702c7c2c5c0af7d38739f6281ebb.exe 27 PID 1564 wrote to memory of 560 1564 b16bb8ce89c42e0f48deb5ba2a8b5c7495c8702c7c2c5c0af7d38739f6281ebb.exe 27 PID 1564 wrote to memory of 560 1564 b16bb8ce89c42e0f48deb5ba2a8b5c7495c8702c7c2c5c0af7d38739f6281ebb.exe 27 PID 1564 wrote to memory of 560 1564 b16bb8ce89c42e0f48deb5ba2a8b5c7495c8702c7c2c5c0af7d38739f6281ebb.exe 27 PID 1564 wrote to memory of 624 1564 b16bb8ce89c42e0f48deb5ba2a8b5c7495c8702c7c2c5c0af7d38739f6281ebb.exe 28 PID 1564 wrote to memory of 624 1564 b16bb8ce89c42e0f48deb5ba2a8b5c7495c8702c7c2c5c0af7d38739f6281ebb.exe 28 PID 1564 wrote to memory of 624 1564 b16bb8ce89c42e0f48deb5ba2a8b5c7495c8702c7c2c5c0af7d38739f6281ebb.exe 28 PID 1564 wrote to memory of 624 1564 b16bb8ce89c42e0f48deb5ba2a8b5c7495c8702c7c2c5c0af7d38739f6281ebb.exe 28 PID 624 wrote to memory of 2012 624 Natasha.exe 29 PID 624 wrote to memory of 2012 624 Natasha.exe 29 PID 624 wrote to memory of 2012 624 Natasha.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b16bb8ce89c42e0f48deb5ba2a8b5c7495c8702c7c2c5c0af7d38739f6281ebb.exe"C:\Users\Admin\AppData\Local\Temp\b16bb8ce89c42e0f48deb5ba2a8b5c7495c8702c7c2c5c0af7d38739f6281ebb.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Users\Admin\AppData\Roaming\NTDYxmw5zzLIBxcMt\AnimeSoftware.exe"C:\Users\Admin\AppData\Roaming\NTDYxmw5zzLIBxcMt\AnimeSoftware.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:560
-
-
C:\Users\Admin\AppData\Roaming\NTDYxmw5zzLIBxcMt\Natasha.exe"C:\Users\Admin\AppData\Roaming\NTDYxmw5zzLIBxcMt\Natasha.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 624 -s 8723⤵
- Program crash
PID:2012
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD573d4ae6f715e1d7e6d1af01b93881279
SHA11a681c4648407cca81cceca881b58e6a6775170b
SHA2563c23db2f7bb122c448868ef969c976914126a15d35aec9c70aee387a1c17b9c2
SHA512329bdccc08f7aec9165dbdd28b136bb220cf26dc8bb9eaff854e17c9c6f769f25b65ea0b81a3bded4146e8419b12004ac95a9b02eb23a2c496e600cab86a30ec
-
Filesize
105KB
MD573d4ae6f715e1d7e6d1af01b93881279
SHA11a681c4648407cca81cceca881b58e6a6775170b
SHA2563c23db2f7bb122c448868ef969c976914126a15d35aec9c70aee387a1c17b9c2
SHA512329bdccc08f7aec9165dbdd28b136bb220cf26dc8bb9eaff854e17c9c6f769f25b65ea0b81a3bded4146e8419b12004ac95a9b02eb23a2c496e600cab86a30ec
-
Filesize
262KB
MD5f63dd24c0b6a1970436c1456cfd29065
SHA16c4c9ecf07ccabf02b54ccc1abf10554231ee29b
SHA256a0cc5f36b04eae3db5582ec2563ed77e83783765addd3460313377c6fcd1b96d
SHA512847ed9d0d93567bc4dce255b68a733d6e1263d32c293cb1df4eff7ec3b6b5254256b76e5097fc33e3518e99c933a3c0785ba553fdca85a51b91e2d4fabda37ac
-
Filesize
262KB
MD5f63dd24c0b6a1970436c1456cfd29065
SHA16c4c9ecf07ccabf02b54ccc1abf10554231ee29b
SHA256a0cc5f36b04eae3db5582ec2563ed77e83783765addd3460313377c6fcd1b96d
SHA512847ed9d0d93567bc4dce255b68a733d6e1263d32c293cb1df4eff7ec3b6b5254256b76e5097fc33e3518e99c933a3c0785ba553fdca85a51b91e2d4fabda37ac
-
Filesize
105KB
MD573d4ae6f715e1d7e6d1af01b93881279
SHA11a681c4648407cca81cceca881b58e6a6775170b
SHA2563c23db2f7bb122c448868ef969c976914126a15d35aec9c70aee387a1c17b9c2
SHA512329bdccc08f7aec9165dbdd28b136bb220cf26dc8bb9eaff854e17c9c6f769f25b65ea0b81a3bded4146e8419b12004ac95a9b02eb23a2c496e600cab86a30ec
-
Filesize
105KB
MD573d4ae6f715e1d7e6d1af01b93881279
SHA11a681c4648407cca81cceca881b58e6a6775170b
SHA2563c23db2f7bb122c448868ef969c976914126a15d35aec9c70aee387a1c17b9c2
SHA512329bdccc08f7aec9165dbdd28b136bb220cf26dc8bb9eaff854e17c9c6f769f25b65ea0b81a3bded4146e8419b12004ac95a9b02eb23a2c496e600cab86a30ec
-
Filesize
105KB
MD573d4ae6f715e1d7e6d1af01b93881279
SHA11a681c4648407cca81cceca881b58e6a6775170b
SHA2563c23db2f7bb122c448868ef969c976914126a15d35aec9c70aee387a1c17b9c2
SHA512329bdccc08f7aec9165dbdd28b136bb220cf26dc8bb9eaff854e17c9c6f769f25b65ea0b81a3bded4146e8419b12004ac95a9b02eb23a2c496e600cab86a30ec
-
Filesize
105KB
MD573d4ae6f715e1d7e6d1af01b93881279
SHA11a681c4648407cca81cceca881b58e6a6775170b
SHA2563c23db2f7bb122c448868ef969c976914126a15d35aec9c70aee387a1c17b9c2
SHA512329bdccc08f7aec9165dbdd28b136bb220cf26dc8bb9eaff854e17c9c6f769f25b65ea0b81a3bded4146e8419b12004ac95a9b02eb23a2c496e600cab86a30ec
-
Filesize
262KB
MD5f63dd24c0b6a1970436c1456cfd29065
SHA16c4c9ecf07ccabf02b54ccc1abf10554231ee29b
SHA256a0cc5f36b04eae3db5582ec2563ed77e83783765addd3460313377c6fcd1b96d
SHA512847ed9d0d93567bc4dce255b68a733d6e1263d32c293cb1df4eff7ec3b6b5254256b76e5097fc33e3518e99c933a3c0785ba553fdca85a51b91e2d4fabda37ac
-
Filesize
262KB
MD5f63dd24c0b6a1970436c1456cfd29065
SHA16c4c9ecf07ccabf02b54ccc1abf10554231ee29b
SHA256a0cc5f36b04eae3db5582ec2563ed77e83783765addd3460313377c6fcd1b96d
SHA512847ed9d0d93567bc4dce255b68a733d6e1263d32c293cb1df4eff7ec3b6b5254256b76e5097fc33e3518e99c933a3c0785ba553fdca85a51b91e2d4fabda37ac
-
Filesize
262KB
MD5f63dd24c0b6a1970436c1456cfd29065
SHA16c4c9ecf07ccabf02b54ccc1abf10554231ee29b
SHA256a0cc5f36b04eae3db5582ec2563ed77e83783765addd3460313377c6fcd1b96d
SHA512847ed9d0d93567bc4dce255b68a733d6e1263d32c293cb1df4eff7ec3b6b5254256b76e5097fc33e3518e99c933a3c0785ba553fdca85a51b91e2d4fabda37ac
-
Filesize
262KB
MD5f63dd24c0b6a1970436c1456cfd29065
SHA16c4c9ecf07ccabf02b54ccc1abf10554231ee29b
SHA256a0cc5f36b04eae3db5582ec2563ed77e83783765addd3460313377c6fcd1b96d
SHA512847ed9d0d93567bc4dce255b68a733d6e1263d32c293cb1df4eff7ec3b6b5254256b76e5097fc33e3518e99c933a3c0785ba553fdca85a51b91e2d4fabda37ac