Resubmissions

29-03-2022 22:33

220329-2ghzjsgchj 10

Analysis

  • max time kernel
    4294179s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20220311-en
  • submitted
    29-03-2022 22:33

General

  • Target

    b16bb8ce89c42e0f48deb5ba2a8b5c7495c8702c7c2c5c0af7d38739f6281ebb.exe

  • Size

    989KB

  • MD5

    118886bd493a37257b963fe26805f516

  • SHA1

    2f61fcbebaca2ffe7b41a63adefad83ec04fb94b

  • SHA256

    b16bb8ce89c42e0f48deb5ba2a8b5c7495c8702c7c2c5c0af7d38739f6281ebb

  • SHA512

    c3753e98a9e2a70fec6d9573c74c70af665e82b5234bfb4ba7fa9a4160b255c3fa2a1328e41ec3d7569bdbd02e078e84181007d4b8f7818c6acf9c67c1157628

Malware Config

Signatures

  • BlackGuard

    Infostealer first seen in Late 2021.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b16bb8ce89c42e0f48deb5ba2a8b5c7495c8702c7c2c5c0af7d38739f6281ebb.exe
    "C:\Users\Admin\AppData\Local\Temp\b16bb8ce89c42e0f48deb5ba2a8b5c7495c8702c7c2c5c0af7d38739f6281ebb.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1564
    • C:\Users\Admin\AppData\Roaming\NTDYxmw5zzLIBxcMt\AnimeSoftware.exe
      "C:\Users\Admin\AppData\Roaming\NTDYxmw5zzLIBxcMt\AnimeSoftware.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:560
    • C:\Users\Admin\AppData\Roaming\NTDYxmw5zzLIBxcMt\Natasha.exe
      "C:\Users\Admin\AppData\Roaming\NTDYxmw5zzLIBxcMt\Natasha.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:624
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 624 -s 872
        3⤵
        • Program crash
        PID:2012

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\NTDYxmw5zzLIBxcMt\AnimeSoftware.exe

    Filesize

    105KB

    MD5

    73d4ae6f715e1d7e6d1af01b93881279

    SHA1

    1a681c4648407cca81cceca881b58e6a6775170b

    SHA256

    3c23db2f7bb122c448868ef969c976914126a15d35aec9c70aee387a1c17b9c2

    SHA512

    329bdccc08f7aec9165dbdd28b136bb220cf26dc8bb9eaff854e17c9c6f769f25b65ea0b81a3bded4146e8419b12004ac95a9b02eb23a2c496e600cab86a30ec

  • C:\Users\Admin\AppData\Roaming\NTDYxmw5zzLIBxcMt\AnimeSoftware.exe

    Filesize

    105KB

    MD5

    73d4ae6f715e1d7e6d1af01b93881279

    SHA1

    1a681c4648407cca81cceca881b58e6a6775170b

    SHA256

    3c23db2f7bb122c448868ef969c976914126a15d35aec9c70aee387a1c17b9c2

    SHA512

    329bdccc08f7aec9165dbdd28b136bb220cf26dc8bb9eaff854e17c9c6f769f25b65ea0b81a3bded4146e8419b12004ac95a9b02eb23a2c496e600cab86a30ec

  • C:\Users\Admin\AppData\Roaming\NTDYxmw5zzLIBxcMt\Natasha.exe

    Filesize

    262KB

    MD5

    f63dd24c0b6a1970436c1456cfd29065

    SHA1

    6c4c9ecf07ccabf02b54ccc1abf10554231ee29b

    SHA256

    a0cc5f36b04eae3db5582ec2563ed77e83783765addd3460313377c6fcd1b96d

    SHA512

    847ed9d0d93567bc4dce255b68a733d6e1263d32c293cb1df4eff7ec3b6b5254256b76e5097fc33e3518e99c933a3c0785ba553fdca85a51b91e2d4fabda37ac

  • C:\Users\Admin\AppData\Roaming\NTDYxmw5zzLIBxcMt\Natasha.exe

    Filesize

    262KB

    MD5

    f63dd24c0b6a1970436c1456cfd29065

    SHA1

    6c4c9ecf07ccabf02b54ccc1abf10554231ee29b

    SHA256

    a0cc5f36b04eae3db5582ec2563ed77e83783765addd3460313377c6fcd1b96d

    SHA512

    847ed9d0d93567bc4dce255b68a733d6e1263d32c293cb1df4eff7ec3b6b5254256b76e5097fc33e3518e99c933a3c0785ba553fdca85a51b91e2d4fabda37ac

  • \Users\Admin\AppData\Roaming\NTDYxmw5zzLIBxcMt\AnimeSoftware.exe

    Filesize

    105KB

    MD5

    73d4ae6f715e1d7e6d1af01b93881279

    SHA1

    1a681c4648407cca81cceca881b58e6a6775170b

    SHA256

    3c23db2f7bb122c448868ef969c976914126a15d35aec9c70aee387a1c17b9c2

    SHA512

    329bdccc08f7aec9165dbdd28b136bb220cf26dc8bb9eaff854e17c9c6f769f25b65ea0b81a3bded4146e8419b12004ac95a9b02eb23a2c496e600cab86a30ec

  • \Users\Admin\AppData\Roaming\NTDYxmw5zzLIBxcMt\AnimeSoftware.exe

    Filesize

    105KB

    MD5

    73d4ae6f715e1d7e6d1af01b93881279

    SHA1

    1a681c4648407cca81cceca881b58e6a6775170b

    SHA256

    3c23db2f7bb122c448868ef969c976914126a15d35aec9c70aee387a1c17b9c2

    SHA512

    329bdccc08f7aec9165dbdd28b136bb220cf26dc8bb9eaff854e17c9c6f769f25b65ea0b81a3bded4146e8419b12004ac95a9b02eb23a2c496e600cab86a30ec

  • \Users\Admin\AppData\Roaming\NTDYxmw5zzLIBxcMt\AnimeSoftware.exe

    Filesize

    105KB

    MD5

    73d4ae6f715e1d7e6d1af01b93881279

    SHA1

    1a681c4648407cca81cceca881b58e6a6775170b

    SHA256

    3c23db2f7bb122c448868ef969c976914126a15d35aec9c70aee387a1c17b9c2

    SHA512

    329bdccc08f7aec9165dbdd28b136bb220cf26dc8bb9eaff854e17c9c6f769f25b65ea0b81a3bded4146e8419b12004ac95a9b02eb23a2c496e600cab86a30ec

  • \Users\Admin\AppData\Roaming\NTDYxmw5zzLIBxcMt\AnimeSoftware.exe

    Filesize

    105KB

    MD5

    73d4ae6f715e1d7e6d1af01b93881279

    SHA1

    1a681c4648407cca81cceca881b58e6a6775170b

    SHA256

    3c23db2f7bb122c448868ef969c976914126a15d35aec9c70aee387a1c17b9c2

    SHA512

    329bdccc08f7aec9165dbdd28b136bb220cf26dc8bb9eaff854e17c9c6f769f25b65ea0b81a3bded4146e8419b12004ac95a9b02eb23a2c496e600cab86a30ec

  • \Users\Admin\AppData\Roaming\NTDYxmw5zzLIBxcMt\Natasha.exe

    Filesize

    262KB

    MD5

    f63dd24c0b6a1970436c1456cfd29065

    SHA1

    6c4c9ecf07ccabf02b54ccc1abf10554231ee29b

    SHA256

    a0cc5f36b04eae3db5582ec2563ed77e83783765addd3460313377c6fcd1b96d

    SHA512

    847ed9d0d93567bc4dce255b68a733d6e1263d32c293cb1df4eff7ec3b6b5254256b76e5097fc33e3518e99c933a3c0785ba553fdca85a51b91e2d4fabda37ac

  • \Users\Admin\AppData\Roaming\NTDYxmw5zzLIBxcMt\Natasha.exe

    Filesize

    262KB

    MD5

    f63dd24c0b6a1970436c1456cfd29065

    SHA1

    6c4c9ecf07ccabf02b54ccc1abf10554231ee29b

    SHA256

    a0cc5f36b04eae3db5582ec2563ed77e83783765addd3460313377c6fcd1b96d

    SHA512

    847ed9d0d93567bc4dce255b68a733d6e1263d32c293cb1df4eff7ec3b6b5254256b76e5097fc33e3518e99c933a3c0785ba553fdca85a51b91e2d4fabda37ac

  • \Users\Admin\AppData\Roaming\NTDYxmw5zzLIBxcMt\Natasha.exe

    Filesize

    262KB

    MD5

    f63dd24c0b6a1970436c1456cfd29065

    SHA1

    6c4c9ecf07ccabf02b54ccc1abf10554231ee29b

    SHA256

    a0cc5f36b04eae3db5582ec2563ed77e83783765addd3460313377c6fcd1b96d

    SHA512

    847ed9d0d93567bc4dce255b68a733d6e1263d32c293cb1df4eff7ec3b6b5254256b76e5097fc33e3518e99c933a3c0785ba553fdca85a51b91e2d4fabda37ac

  • \Users\Admin\AppData\Roaming\NTDYxmw5zzLIBxcMt\Natasha.exe

    Filesize

    262KB

    MD5

    f63dd24c0b6a1970436c1456cfd29065

    SHA1

    6c4c9ecf07ccabf02b54ccc1abf10554231ee29b

    SHA256

    a0cc5f36b04eae3db5582ec2563ed77e83783765addd3460313377c6fcd1b96d

    SHA512

    847ed9d0d93567bc4dce255b68a733d6e1263d32c293cb1df4eff7ec3b6b5254256b76e5097fc33e3518e99c933a3c0785ba553fdca85a51b91e2d4fabda37ac

  • memory/560-69-0x0000000000220000-0x0000000000240000-memory.dmp

    Filesize

    128KB

  • memory/560-73-0x0000000004F05000-0x0000000004F16000-memory.dmp

    Filesize

    68KB

  • memory/624-70-0x0000000000AF0000-0x0000000000B38000-memory.dmp

    Filesize

    288KB

  • memory/624-72-0x0000000001F50000-0x0000000001F52000-memory.dmp

    Filesize

    8KB

  • memory/1564-54-0x0000000075611000-0x0000000075613000-memory.dmp

    Filesize

    8KB