Analysis

  • max time kernel
    144s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-12-2023 16:24

General

  • Target

    edda982bfd8986d01a3b5e005e5755ca.exe

  • Size

    246KB

  • MD5

    edda982bfd8986d01a3b5e005e5755ca

  • SHA1

    68cbb8e9965fae9da6afba41dd600190755efe35

  • SHA256

    10b86a89f56513268e5094837990648fec44b1ddf3f2f2c959dc23f6a4d8c630

  • SHA512

    1309b7096e7e4733a036e4093ec28c9477ced09da85fffb838998a50354d9742b5cdef3b785ed1f74c107d51d0fc8d5e3b0160251cb14b54bd78aab696c91df1

  • SSDEEP

    6144:vKSTkgWAlEC9R9+EWj2JH/OkNfKjbvWCeQWJ:zYgWAl7AjEfXKmCVWJ

Malware Config

Extracted

Family

blackguard

C2

https://api.telegram.org/bot1711224512:AAG22Nlr-jO4MyOqR-e8u_WyFQ4Bw7rDtVw/sendMessage?chat_id=1640241476

Signatures

  • BlackGuard

    Infostealer first seen in Late 2021.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\edda982bfd8986d01a3b5e005e5755ca.exe
    "C:\Users\Admin\AppData\Local\Temp\edda982bfd8986d01a3b5e005e5755ca.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\OxxTSBKFJQM.Admin\Browsers\Firefox\Bookmarks.txt

    Filesize

    105B

    MD5

    2e9d094dda5cdc3ce6519f75943a4ff4

    SHA1

    5d989b4ac8b699781681fe75ed9ef98191a5096c

    SHA256

    c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142

    SHA512

    d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7

  • C:\Users\Admin\AppData\Roaming\OxxTSBKFJQM.Admin\Process.txt

    Filesize

    644B

    MD5

    d527fc035ec3e45797c17d5e86fdd5a0

    SHA1

    4277b71b9eb71b8d1c3576fab1e5b0c8419232f0

    SHA256

    fa19c2d026d95c1749defa1fc26aa3ea4c85416aedf56798946703480b16a2ff

    SHA512

    5e2aea2506dfb9a594ab2b3304ee212d179f44c666e0637dba98e13b7eebbc6736e9b5f8ad9ff4a0cf174f8188b66b0e81c77b24e4f2d2bed0505d8cc7a8554a

  • C:\Users\Admin\AppData\Roaming\OxxTSBKFJQM.Admin\Process.txt

    Filesize

    738B

    MD5

    569afc520494d51c6255282b2fa5b05f

    SHA1

    2dc48e668e4ac8375767223e5926978757b0e456

    SHA256

    f48cff798fd09b2c1eac6b9e7269ea1558abf80cf824cf74a8b0546e825ce7e3

    SHA512

    f6957dd2819aeb9c9fe539506c5e1b0712e598e8e10befebe8f2c00a23a28d552b94e568664a3c64ef6286839438742325401dac7fd9a70a7066ea5a87daebab

  • memory/2692-1-0x00000000745C0000-0x0000000074D70000-memory.dmp

    Filesize

    7.7MB

  • memory/2692-0-0x0000000000D10000-0x0000000000D54000-memory.dmp

    Filesize

    272KB

  • memory/2692-2-0x00000000056D0000-0x00000000056E0000-memory.dmp

    Filesize

    64KB

  • memory/2692-3-0x0000000005D70000-0x0000000006314000-memory.dmp

    Filesize

    5.6MB

  • memory/2692-4-0x00000000058C0000-0x0000000005926000-memory.dmp

    Filesize

    408KB

  • memory/2692-10-0x0000000006DE0000-0x0000000006E72000-memory.dmp

    Filesize

    584KB

  • memory/2692-144-0x00000000745C0000-0x0000000074D70000-memory.dmp

    Filesize

    7.7MB