Analysis

  • max time kernel
    7s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-12-2023 20:05

General

  • Target

    f4a727a2f17b57b2595324c3417a8098.exe

  • Size

    1.7MB

  • MD5

    f4a727a2f17b57b2595324c3417a8098

  • SHA1

    84e0b86f87c1859950ecc14dfd362b4776f6ce7e

  • SHA256

    baabcaab44f18457de9e2c0fb12c7191da6661d3c3f04439c972845870195cb9

  • SHA512

    b648db2e85b94590386be68a5f9a32d6a8fa06f3fde37ceeeade7e5d3f1424055d4fa62a69bd984128a8f896c1b05ee58724c391bccfce8f517ed0a426cb5144

  • SSDEEP

    49152:jtqZt+8WcOxXLyv7DyX2sugIuR0+Jfkg:j0Zt+yOxXLyv7DygOFdkg

Malware Config

Extracted

Family

blackguard

C2

https://api.telegram.org/bot1884637411:AAF-rJTB6AdEZjSla1g0hzeCLDs8bt6YKsI/sendMessage?chat_id=1050934663

Signatures

  • BlackGuard

    Infostealer first seen in Late 2021.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f4a727a2f17b57b2595324c3417a8098.exe
    "C:\Users\Admin\AppData\Local\Temp\f4a727a2f17b57b2595324c3417a8098.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:3192

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3192-0-0x00000000001E0000-0x00000000006C0000-memory.dmp

    Filesize

    4.9MB

  • memory/3192-3-0x00000000058E0000-0x00000000058F0000-memory.dmp

    Filesize

    64KB

  • memory/3192-2-0x00000000745B0000-0x0000000074D60000-memory.dmp

    Filesize

    7.7MB

  • memory/3192-1-0x00000000001E0000-0x00000000006C0000-memory.dmp

    Filesize

    4.9MB

  • memory/3192-40-0x0000000006EA0000-0x0000000007444000-memory.dmp

    Filesize

    5.6MB

  • memory/3192-39-0x0000000006850000-0x00000000068E2000-memory.dmp

    Filesize

    584KB

  • memory/3192-131-0x0000000006CE0000-0x0000000006D46000-memory.dmp

    Filesize

    408KB

  • memory/3192-161-0x00000000077D0000-0x00000000077F2000-memory.dmp

    Filesize

    136KB

  • memory/3192-162-0x0000000007800000-0x0000000007B54000-memory.dmp

    Filesize

    3.3MB

  • memory/3192-160-0x0000000006AC0000-0x0000000006AC8000-memory.dmp

    Filesize

    32KB

  • memory/3192-159-0x0000000006320000-0x000000000632A000-memory.dmp

    Filesize

    40KB

  • memory/3192-164-0x00000000001E0000-0x00000000006C0000-memory.dmp

    Filesize

    4.9MB

  • memory/3192-166-0x00000000745B0000-0x0000000074D60000-memory.dmp

    Filesize

    7.7MB

  • memory/3192-167-0x00000000058E0000-0x00000000058F0000-memory.dmp

    Filesize

    64KB

  • memory/3192-179-0x00000000001E0000-0x00000000006C0000-memory.dmp

    Filesize

    4.9MB

  • memory/3192-180-0x00000000745B0000-0x0000000074D60000-memory.dmp

    Filesize

    7.7MB