Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
15-08-2023 18:13
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230703-en
General
-
Target
tmp.exe
-
Size
115KB
-
MD5
bfaa027a645e567824a10a26fb8dbefd
-
SHA1
4ab52a0b1cc105a5462c2255ef84be9af431b82e
-
SHA256
c67b6f45d0beb461838f87ca2ad4774b52d7ccf9b0fa36652e8642dc72f43302
-
SHA512
2f7ab0e4451cfeec017ba294cfcbc6f02d85c756bebce1cf9b3c69f6c77386fe9a21897734c44f4aa32dcaf3a1b7fbaaf0c4639edab1c8961761767a656b4569
-
SSDEEP
1536:ztCbuEYE+9z2wpuFavGmhMnDIhzZtz20tnh/:5CbuAsEFNmhMnDIhNI0tnh/
Malware Config
Extracted
blackguard
http://94.142.138.111
Signatures
-
BlackGuard
Infostealer first seen in Late 2021.
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 228 dtsmsys.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\flWyfUU = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\dtsmsys.exe\"" dtsmsys.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 24 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 10 IoCs
description ioc Process Key deleted \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\ms-settings\Shell\Open\command dtsmsys.exe Key deleted \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\ms-settings\Shell dtsmsys.exe Key deleted \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\ms-settings dtsmsys.exe Key created \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\ms-settings\Shell\Open\command dtsmsys.exe Key created \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\ms-settings dtsmsys.exe Key created \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\ms-settings\Shell dtsmsys.exe Key created \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\ms-settings\Shell\Open dtsmsys.exe Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\ms-settings\Shell\Open\command\ = "powershell.exe -command Add-MpPreference -ExclusionPath C:\\" dtsmsys.exe Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\ms-settings\Shell\Open\command\DelegateExecute dtsmsys.exe Key deleted \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\ms-settings\Shell\Open dtsmsys.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 228 dtsmsys.exe 228 dtsmsys.exe 4888 PowerShell.exe 4888 PowerShell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1204 tmp.exe Token: SeDebugPrivilege 228 dtsmsys.exe Token: SeDebugPrivilege 4888 PowerShell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1204 wrote to memory of 228 1204 tmp.exe 89 PID 1204 wrote to memory of 228 1204 tmp.exe 89 PID 228 wrote to memory of 4696 228 dtsmsys.exe 91 PID 228 wrote to memory of 4696 228 dtsmsys.exe 91 PID 4696 wrote to memory of 4888 4696 fodhelper.exe 92 PID 4696 wrote to memory of 4888 4696 fodhelper.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\dtsmsys.exe"C:\Users\Admin\AppData\Local\Temp\dtsmsys.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\System32\fodhelper.exe"C:\Windows\System32\fodhelper.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe"PowerShell.exe" -command Add-MpPreference -ExclusionPath C:\4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4888
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3.4MB
MD5e695b8888af3b57f1a56961bd289463c
SHA1e8c3892fcf4635a16fe91b9542953e2ac5141df2
SHA256c5a45793d7c361f18d36c190b86c951bf0e7a01ad52132c7e9e9d4101eff73aa
SHA5123c1ba39b7819020ad748bfd8bc0cca01fda5e5c7a2111ec6c034bf99e1974f27cb6a1ad7b3e26ffcfb150c447349661771fd21d54c25602ab01c1b1b43346ce1
-
Filesize
3.4MB
MD5e695b8888af3b57f1a56961bd289463c
SHA1e8c3892fcf4635a16fe91b9542953e2ac5141df2
SHA256c5a45793d7c361f18d36c190b86c951bf0e7a01ad52132c7e9e9d4101eff73aa
SHA5123c1ba39b7819020ad748bfd8bc0cca01fda5e5c7a2111ec6c034bf99e1974f27cb6a1ad7b3e26ffcfb150c447349661771fd21d54c25602ab01c1b1b43346ce1
-
Filesize
3.4MB
MD5e695b8888af3b57f1a56961bd289463c
SHA1e8c3892fcf4635a16fe91b9542953e2ac5141df2
SHA256c5a45793d7c361f18d36c190b86c951bf0e7a01ad52132c7e9e9d4101eff73aa
SHA5123c1ba39b7819020ad748bfd8bc0cca01fda5e5c7a2111ec6c034bf99e1974f27cb6a1ad7b3e26ffcfb150c447349661771fd21d54c25602ab01c1b1b43346ce1
-
Filesize
20KB
MD549693267e0adbcd119f9f5e02adf3a80
SHA13ba3d7f89b8ad195ca82c92737e960e1f2b349df
SHA256d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f
SHA512b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2