Analysis

  • max time kernel
    136s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20230621-en
  • resource tags

    arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system
  • submitted
    30-06-2023 12:06

General

  • Target

    Build-1S.exe

  • Size

    3.4MB

  • MD5

    e695b8888af3b57f1a56961bd289463c

  • SHA1

    e8c3892fcf4635a16fe91b9542953e2ac5141df2

  • SHA256

    c5a45793d7c361f18d36c190b86c951bf0e7a01ad52132c7e9e9d4101eff73aa

  • SHA512

    3c1ba39b7819020ad748bfd8bc0cca01fda5e5c7a2111ec6c034bf99e1974f27cb6a1ad7b3e26ffcfb150c447349661771fd21d54c25602ab01c1b1b43346ce1

  • SSDEEP

    98304:8QBNUcwti78OqJ7TPBSHgMWJ0bJpqcV/:TzUcwti7TQlSBWJq1x

Malware Config

Extracted

Family

blackguard

C2

http://94.142.138.111

Signatures

  • BlackGuard

    Infostealer first seen in Late 2021.

  • Downloads MZ/PE file
  • Allows Network login with blank passwords 1 TTPs 1 IoCs

    Allows local user accounts with blank passwords to access device from the network.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 10 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Build-1S.exe
    "C:\Users\Admin\AppData\Local\Temp\Build-1S.exe"
    1⤵
    • Allows Network login with blank passwords
    • Accesses Microsoft Outlook profiles
    • Adds Run key to start application
    • Modifies registry class
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • outlook_office_path
    • outlook_win_path
    PID:1724

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b95eafa8c5cd58bf06cf6908982d4cf5

    SHA1

    1ac4e663fc74734b77130d2f725a65cdb097aa94

    SHA256

    970f735202ee8f97c6168e1f69a380389ad15a08a6e6cd1c34b38a8110441a21

    SHA512

    baaca847fd48a25126cb58ee9e6deb342da425f23afb5a6be1f898fe184869bb9991697963be75de043858be2b1fc63d8dbf9bd239b2689d4274bbb1d648d64b

  • C:\Users\Admin\AppData\Local\Temp\Cab1A1D.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar1AEA.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Local\hndtbrK.FEror\Files\EnableBackup.txt

    Filesize

    835KB

    MD5

    ddfd1c3cf127c39b35097ef86938d4ed

    SHA1

    829a4300e1af24ab91c614c13d4f2463ea8948f1

    SHA256

    74c31747aa74cb01de32e7353ae3a51f8193a430c172ae777b4c6b9d5dc50ef0

    SHA512

    b6d44770c2de9f5d12314761ef1ab387f7854a6dd38eee4e093d117692122275fa001de6aef374133169910cec4848694e4fb3944850f05a44e12ed8ffe4d32d

  • C:\Users\Admin\AppData\Local\hndtbrK.FEror\sysInformation.txt

    Filesize

    809B

    MD5

    19a5c9ce84f0776239a11ff26056e61c

    SHA1

    ece40720d52d836e91b11503c69bdaef3993365f

    SHA256

    38e2d9bbe788f21137dc91739e37441699068479e602ba1ca2be28ae8306f97e

    SHA512

    d8cc7c9c0e8fff07e715d1058c2e8213fcf6a6f1b43902b166e5212f31a428aae1715cb5ee4e936a8b8148090fa8fc4eef47eb7e04e991380a67e7becdbdf653

  • memory/1724-54-0x00000000003E0000-0x000000000072A000-memory.dmp

    Filesize

    3.3MB

  • memory/1724-55-0x000000001B010000-0x000000001B0C2000-memory.dmp

    Filesize

    712KB

  • memory/1724-56-0x000000001B1A0000-0x000000001B220000-memory.dmp

    Filesize

    512KB

  • memory/1724-67-0x000000001CAE0000-0x000000001CE0E000-memory.dmp

    Filesize

    3.2MB

  • memory/1724-70-0x000000001B6D0000-0x000000001B746000-memory.dmp

    Filesize

    472KB

  • memory/1724-69-0x000000001B1A0000-0x000000001B220000-memory.dmp

    Filesize

    512KB