Analysis
-
max time kernel
44s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220331-en -
submitted
01-04-2022 04:56
Static task
static1
Behavioral task
behavioral1
Sample
bbc8ac47d3051fbab328d4a8a4c1c8819707ac045ab6ac94b1997dac59be2ece.exe
Resource
win7-20220331-en
Behavioral task
behavioral2
Sample
bbc8ac47d3051fbab328d4a8a4c1c8819707ac045ab6ac94b1997dac59be2ece.exe
Resource
win10v2004-20220331-en
General
-
Target
bbc8ac47d3051fbab328d4a8a4c1c8819707ac045ab6ac94b1997dac59be2ece.exe
-
Size
100KB
-
MD5
79a61e4b2b9c84436ce2010aa04e718f
-
SHA1
4b676837ce4520277ad05c0657c147c9f161d3c7
-
SHA256
bbc8ac47d3051fbab328d4a8a4c1c8819707ac045ab6ac94b1997dac59be2ece
-
SHA512
8878ec221e9851f49f65e1436689df26a585bcabc8b7be33c99b58243a8eb5e0682901086fd99b3e4923ca6f71b523cf0e4d0a557648325c1ae3b2b25af8bfc4
Malware Config
Extracted
blackguard
https://blguard.shop/
Signatures
-
BlackGuard
Infostealer first seen in Late 2021.
-
Program crash 1 IoCs
pid pid_target Process procid_target 752 528 WerFault.exe 19 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 528 bbc8ac47d3051fbab328d4a8a4c1c8819707ac045ab6ac94b1997dac59be2ece.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 528 wrote to memory of 752 528 bbc8ac47d3051fbab328d4a8a4c1c8819707ac045ab6ac94b1997dac59be2ece.exe 29 PID 528 wrote to memory of 752 528 bbc8ac47d3051fbab328d4a8a4c1c8819707ac045ab6ac94b1997dac59be2ece.exe 29 PID 528 wrote to memory of 752 528 bbc8ac47d3051fbab328d4a8a4c1c8819707ac045ab6ac94b1997dac59be2ece.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbc8ac47d3051fbab328d4a8a4c1c8819707ac045ab6ac94b1997dac59be2ece.exe"C:\Users\Admin\AppData\Local\Temp\bbc8ac47d3051fbab328d4a8a4c1c8819707ac045ab6ac94b1997dac59be2ece.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 528 -s 7002⤵
- Program crash
PID:752
-