Analysis
-
max time kernel
84s -
max time network
172s -
platform
windows7_x64 -
resource
win7-20220331-en -
submitted
01-04-2022 04:52
Static task
static1
Behavioral task
behavioral1
Sample
71edf6e4460d3eaf5f385610004cfd68d1a08b753d3991c6a64ca61beb4c673a.exe
Resource
win7-20220331-en
Behavioral task
behavioral2
Sample
71edf6e4460d3eaf5f385610004cfd68d1a08b753d3991c6a64ca61beb4c673a.exe
Resource
win10v2004-20220331-en
General
-
Target
71edf6e4460d3eaf5f385610004cfd68d1a08b753d3991c6a64ca61beb4c673a.exe
-
Size
1.5MB
-
MD5
bcb90ad9d64c26c3fc5d259a5fe57f15
-
SHA1
b1d565021362259003da96566b46cf42566f1808
-
SHA256
71edf6e4460d3eaf5f385610004cfd68d1a08b753d3991c6a64ca61beb4c673a
-
SHA512
133628db136751e4f8c6419e377b8dc68d0f4bc1018c0d1eec798a4b38e486c4138c869f312046a6ddc31db4d4359e10e38d5e24ad1b649057a260a61b7f2131
Malware Config
Extracted
blackguard
https://win.mirtonewbacker.com/
Signatures
-
BlackGuard
Infostealer first seen in Late 2021.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1224 624 WerFault.exe 27 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 624 71edf6e4460d3eaf5f385610004cfd68d1a08b753d3991c6a64ca61beb4c673a.exe 624 71edf6e4460d3eaf5f385610004cfd68d1a08b753d3991c6a64ca61beb4c673a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 624 71edf6e4460d3eaf5f385610004cfd68d1a08b753d3991c6a64ca61beb4c673a.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 624 wrote to memory of 1224 624 71edf6e4460d3eaf5f385610004cfd68d1a08b753d3991c6a64ca61beb4c673a.exe 29 PID 624 wrote to memory of 1224 624 71edf6e4460d3eaf5f385610004cfd68d1a08b753d3991c6a64ca61beb4c673a.exe 29 PID 624 wrote to memory of 1224 624 71edf6e4460d3eaf5f385610004cfd68d1a08b753d3991c6a64ca61beb4c673a.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\71edf6e4460d3eaf5f385610004cfd68d1a08b753d3991c6a64ca61beb4c673a.exe"C:\Users\Admin\AppData\Local\Temp\71edf6e4460d3eaf5f385610004cfd68d1a08b753d3991c6a64ca61beb4c673a.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 624 -s 5162⤵
- Program crash
PID:1224
-