Analysis

  • max time kernel
    152s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230621-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-06-2023 12:06

General

  • Target

    Build-1S.exe

  • Size

    3.4MB

  • MD5

    e695b8888af3b57f1a56961bd289463c

  • SHA1

    e8c3892fcf4635a16fe91b9542953e2ac5141df2

  • SHA256

    c5a45793d7c361f18d36c190b86c951bf0e7a01ad52132c7e9e9d4101eff73aa

  • SHA512

    3c1ba39b7819020ad748bfd8bc0cca01fda5e5c7a2111ec6c034bf99e1974f27cb6a1ad7b3e26ffcfb150c447349661771fd21d54c25602ab01c1b1b43346ce1

  • SSDEEP

    98304:8QBNUcwti78OqJ7TPBSHgMWJ0bJpqcV/:TzUcwti7TQlSBWJq1x

Score
10/10

Malware Config

Extracted

Family

blackguard

C2

http://94.142.138.111

Signatures

  • BlackGuard

    Infostealer first seen in Late 2021.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Build-1S.exe
    "C:\Users\Admin\AppData\Local\Temp\Build-1S.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3908
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 3908 -s 1448
      2⤵
      • Program crash
      PID:1216
  • C:\Windows\system32\WerFault.exe
    C:\Windows\system32\WerFault.exe -pss -s 360 -p 3908 -ip 3908
    1⤵
      PID:3236

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3908-133-0x000001B74F260000-0x000001B74F5AA000-memory.dmp

      Filesize

      3.3MB

    • memory/3908-134-0x000001B769B40000-0x000001B769B50000-memory.dmp

      Filesize

      64KB

    • memory/3908-135-0x000001B769B40000-0x000001B769B50000-memory.dmp

      Filesize

      64KB

    • memory/3908-136-0x000001B7512C0000-0x000001B7512E2000-memory.dmp

      Filesize

      136KB