Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
16-01-2023 02:57
Behavioral task
behavioral1
Sample
suspicious.exe
Resource
win7-20221111-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
suspicious.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
suspicious.exe
-
Size
4.2MB
-
MD5
bbb9de0f35d59374d7267f983a3f362b
-
SHA1
0c4df9e1941b1f555b867b016148409b51f49f63
-
SHA256
c98e24c174130bba4836e08d24170866aa7128d62d3e2b25f3bc8562fdc74a66
-
SHA512
4f0138f6bc8c2c015bc37b2a8178bf0fa043af90e6d1a487f7f739486e16d53d0d3ba86d8d30a060d93a038f63bc6cad23531bba90ff3c3aa7c9fc76f2858097
-
SSDEEP
49152:ghpEf4/4hyBYKMD+SNfXCwJtezvOd0HSC3souk1b36rH4cseBzjyxeb:ghpEwMD+SNfCWtwlcAxC
Score
10/10
Malware Config
Extracted
Family
blackguard
C2
https://win.mirtonewbacker.com/
Signatures
-
BlackGuard
Infostealer first seen in Late 2021.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4884 4216 WerFault.exe 79 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4216 suspicious.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\suspicious.exe"C:\Users\Admin\AppData\Local\Temp\suspicious.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4216 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4216 -s 17442⤵
- Program crash
PID:4884
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 408 -p 4216 -ip 42161⤵PID:4364