Analysis
-
max time kernel
133s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20220310-en -
submitted
01-04-2022 05:01
Static task
static1
Behavioral task
behavioral1
Sample
1388-55-0x0000000000B70000-0x0000000000BC4000-memory.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
1388-55-0x0000000000B70000-0x0000000000BC4000-memory.exe
Resource
win10v2004-20220310-en
General
-
Target
1388-55-0x0000000000B70000-0x0000000000BC4000-memory.exe
-
Size
336KB
-
MD5
c9d522b650a08a5ac3374240cd7e4da3
-
SHA1
dc0b9124cad566be7b5e65f2528d8300b1040007
-
SHA256
a49fd25b00e8ef3240caec0ccb08d0f0da1e4b5779f611c030df80b13f7ead11
-
SHA512
b2e84b9bd22165307deb188695be15252c3974633c054d6ef9dd908f956f7564d48a62760f70c1fbfed5d25cd32d5bf0c6085025340b1e89fe4da6b8446a164f
Malware Config
Extracted
blackguard
https://umpulumpu.ru/
Signatures
-
BlackGuard
Infostealer first seen in Late 2021.
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{A9904DC6-B4FE-4648-B044-86B074CB8CE6}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{8CE13AF4-27E6-4B6F-BD12-DFEF70D4D370}.catalogItem svchost.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2936 4196 WerFault.exe 81 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4196 1388-55-0x0000000000B70000-0x0000000000BC4000-memory.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1388-55-0x0000000000B70000-0x0000000000BC4000-memory.exe"C:\Users\Admin\AppData\Local\Temp\1388-55-0x0000000000B70000-0x0000000000BC4000-memory.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4196 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4196 -s 19722⤵
- Program crash
PID:2936
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
PID:1320
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 408 -p 4196 -ip 41961⤵PID:2200