Analysis

  • max time kernel
    69s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    14-05-2023 19:56

General

  • Target

    LUDOMAN.exe

  • Size

    10.3MB

  • MD5

    1440a945528a8b6a1040fadf6209ca3f

  • SHA1

    7bbac2ff658c58f3e84acc137ae482096692e230

  • SHA256

    47054077fb2dbdbb6727f69af4547ebeb333736ae3656156f572bf3cd08df38f

  • SHA512

    854f64cad9a0f85a70599439b89692a7e8e7d19f08b9d9cb5bc0a1f17f1b4f835046367c4e0cb2cf7f74538a548f9d1d1d442987d2ab4af5895fe330be6c7e53

  • SSDEEP

    196608:+iHmim2+3DvpLgNEoZiD689QijlQjQ65n44Sv76x2p2h:Tmim2QbBgNr0HZQ/vy6

Malware Config

Signatures

  • BlackGuard

    Infostealer first seen in Late 2021.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\LUDOMAN.exe
    "C:\Users\Admin\AppData\Local\Temp\LUDOMAN.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1936
    • C:\Users\Admin\AppData\Local\Temp\VegaStealer_v1.exe
      "C:\Users\Admin\AppData\Local\Temp\VegaStealer_v1.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1748
      • C:\Users\Admin\AppData\Local\Temp\v1.exe
        "C:\Users\Admin\AppData\Local\Temp\v1.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1120
  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\Desktop\New Microsoft Word Document.docx"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:864

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\SQLite.Interop.dll

    Filesize

    1.7MB

    MD5

    a73fdfb6815b151848257eca042a42ef

    SHA1

    73f18e6b4d1f638e7ce2a7ad36635018482f2c55

    SHA256

    10c9ccec863ed80850c7b7080e4f2e34b133ce259d1ae3ea7a305cebf6e2940d

    SHA512

    111f5a7bd916ab317fc127cbf49a2a81c2a614ce3a655a0446f2ebf3c2e61509db5633a391bef06c4ba0b58a71c752262ec2467a09abc56827263c647b08a09d

  • C:\Users\Admin\AppData\Local\Temp\VegaStealer_v1.exe

    Filesize

    6.7MB

    MD5

    e9c7d4bf51f7cb3cebef7cef43b16dc0

    SHA1

    125ce22c0b3b4b9da534b475385651dff4ef804e

    SHA256

    fa33d76c36399c1c2a351670407208625e8ea621e04d6290a42af55c59d70181

    SHA512

    5e7ac797143f94c489d2b1d878dfa1445966096a62d831c2389232db14cfb7b92ff05feddfb1c0f0380773e3ff9783b5770411e01c302e9505a48da49bb41885

  • C:\Users\Admin\AppData\Local\Temp\VegaStealer_v1.exe

    Filesize

    6.7MB

    MD5

    e9c7d4bf51f7cb3cebef7cef43b16dc0

    SHA1

    125ce22c0b3b4b9da534b475385651dff4ef804e

    SHA256

    fa33d76c36399c1c2a351670407208625e8ea621e04d6290a42af55c59d70181

    SHA512

    5e7ac797143f94c489d2b1d878dfa1445966096a62d831c2389232db14cfb7b92ff05feddfb1c0f0380773e3ff9783b5770411e01c302e9505a48da49bb41885

  • C:\Users\Admin\AppData\Local\Temp\v1.exe

    Filesize

    4.6MB

    MD5

    dcd019a82bdeebdb987f17d483e0b681

    SHA1

    53f3e681bc2c29b0f6f290a79e8fb68fe0bbd164

    SHA256

    267d1fe22ac34393b370f892a1fd9a428c4ad15085b9ae3956d7180762ea19a1

    SHA512

    4120ffe0c751dba94cbbbc2de2d126e3e64d14d3a2ca73548dd4cadbac507d81b9480fad36158b89ed4f8c6d7c2fc8bfc05560f781bdbf5441ae0f537eabe524

  • C:\Users\Admin\AppData\Local\Temp\v1.exe

    Filesize

    4.6MB

    MD5

    dcd019a82bdeebdb987f17d483e0b681

    SHA1

    53f3e681bc2c29b0f6f290a79e8fb68fe0bbd164

    SHA256

    267d1fe22ac34393b370f892a1fd9a428c4ad15085b9ae3956d7180762ea19a1

    SHA512

    4120ffe0c751dba94cbbbc2de2d126e3e64d14d3a2ca73548dd4cadbac507d81b9480fad36158b89ed4f8c6d7c2fc8bfc05560f781bdbf5441ae0f537eabe524

  • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

    Filesize

    20KB

    MD5

    e1ddcfdcf158928691bf566811bcd3ea

    SHA1

    55f6061727691c1e63f8d15f4769245e27b33381

    SHA256

    2f86b7eeadedb57781f5de814a1d277f1a1dcbffd895f7f0fbad431e394d9bc5

    SHA512

    b1ec681e808b9bcb1e0797d3d278b4a95ace30d0348da408367a236f15ab35b0ece14d1a5b80e5cda2e5506fd61c08e4eaed009257f0cf295df59ff40f0ffcb0

  • C:\Users\Admin\AppData\Roaming\SystemFiles\Process.txt

    Filesize

    383B

    MD5

    e84afee6106fa1f3e5b16db03cce550e

    SHA1

    696c8ec64145f4424467d988eb82157244d8cad4

    SHA256

    1bb7748cacbe29c7fe951f69e37294dc74541711c3a7bd5921a11618f4bdc110

    SHA512

    9cb4f553bba73bb0ec06c73485fb81c4145bafcaad53d4c806c2cb5e7dc65d467fb0b9b6b4fa19c91993191e5ca505d995a587c070826425a251ac86ecb5cf1d

  • \Users\Admin\AppData\Local\Temp\SQLite.Interop.dll

    Filesize

    1.7MB

    MD5

    a73fdfb6815b151848257eca042a42ef

    SHA1

    73f18e6b4d1f638e7ce2a7ad36635018482f2c55

    SHA256

    10c9ccec863ed80850c7b7080e4f2e34b133ce259d1ae3ea7a305cebf6e2940d

    SHA512

    111f5a7bd916ab317fc127cbf49a2a81c2a614ce3a655a0446f2ebf3c2e61509db5633a391bef06c4ba0b58a71c752262ec2467a09abc56827263c647b08a09d

  • \Users\Admin\AppData\Local\Temp\VegaStealer_v1.exe

    Filesize

    6.7MB

    MD5

    e9c7d4bf51f7cb3cebef7cef43b16dc0

    SHA1

    125ce22c0b3b4b9da534b475385651dff4ef804e

    SHA256

    fa33d76c36399c1c2a351670407208625e8ea621e04d6290a42af55c59d70181

    SHA512

    5e7ac797143f94c489d2b1d878dfa1445966096a62d831c2389232db14cfb7b92ff05feddfb1c0f0380773e3ff9783b5770411e01c302e9505a48da49bb41885

  • \Users\Admin\AppData\Local\Temp\VegaStealer_v1.exe

    Filesize

    6.7MB

    MD5

    e9c7d4bf51f7cb3cebef7cef43b16dc0

    SHA1

    125ce22c0b3b4b9da534b475385651dff4ef804e

    SHA256

    fa33d76c36399c1c2a351670407208625e8ea621e04d6290a42af55c59d70181

    SHA512

    5e7ac797143f94c489d2b1d878dfa1445966096a62d831c2389232db14cfb7b92ff05feddfb1c0f0380773e3ff9783b5770411e01c302e9505a48da49bb41885

  • \Users\Admin\AppData\Local\Temp\v1.exe

    Filesize

    4.6MB

    MD5

    dcd019a82bdeebdb987f17d483e0b681

    SHA1

    53f3e681bc2c29b0f6f290a79e8fb68fe0bbd164

    SHA256

    267d1fe22ac34393b370f892a1fd9a428c4ad15085b9ae3956d7180762ea19a1

    SHA512

    4120ffe0c751dba94cbbbc2de2d126e3e64d14d3a2ca73548dd4cadbac507d81b9480fad36158b89ed4f8c6d7c2fc8bfc05560f781bdbf5441ae0f537eabe524

  • memory/864-144-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/864-177-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1120-79-0x0000000000660000-0x00000000006BA000-memory.dmp

    Filesize

    360KB

  • memory/1120-80-0x00000000006C0000-0x00000000006DA000-memory.dmp

    Filesize

    104KB

  • memory/1120-82-0x0000000000C90000-0x0000000000CF6000-memory.dmp

    Filesize

    408KB

  • memory/1120-101-0x000000001D3C0000-0x000000001D6EE000-memory.dmp

    Filesize

    3.2MB

  • memory/1120-78-0x000000001AF20000-0x000000001AFA0000-memory.dmp

    Filesize

    512KB

  • memory/1120-77-0x0000000000A10000-0x0000000000AC2000-memory.dmp

    Filesize

    712KB

  • memory/1120-106-0x0000000000430000-0x0000000000455000-memory.dmp

    Filesize

    148KB

  • memory/1120-76-0x0000000001380000-0x0000000001818000-memory.dmp

    Filesize

    4.6MB

  • memory/1120-139-0x000000001AF20000-0x000000001AFA0000-memory.dmp

    Filesize

    512KB

  • memory/1936-54-0x0000000000400000-0x0000000000E51000-memory.dmp

    Filesize

    10.3MB