Analysis
-
max time kernel
184s -
max time network
195s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2023 22:54
Static task
static1
Behavioral task
behavioral1
Sample
063adc7edd5785637dff0fe0a606c36b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
063adc7edd5785637dff0fe0a606c36b.exe
Resource
win10v2004-20231215-en
General
-
Target
063adc7edd5785637dff0fe0a606c36b.exe
-
Size
1.7MB
-
MD5
063adc7edd5785637dff0fe0a606c36b
-
SHA1
c2a4fd1c096fbe9cc4347a470355848f597f3af7
-
SHA256
3ef9b22bb2941ee55af25105b87c675ef1bf6acf8928b339e36e5da08958e852
-
SHA512
c011c9a11f4dd86ca706a6fae86cc89331b4b6747c29330a79b2c513ac2c5d68dffe0160b8c67e68c4c102002414a7a4675fe2315e3470461fcd889c319b631a
-
SSDEEP
49152:rFIAvAzZmo08b9N0qmI6pMH6UHP916LSfbqki67bFrp:5IAYzxVb9NR16pMHbHP916aql
Malware Config
Extracted
blackguard
https://api.telegram.org/bot1932930596:AAGkiZTh1w6VZfvuopWYz6JzBbBOSRI3Ja4/sendMessage?chat_id=1089147415
Signatures
-
BlackGuard
Infostealer first seen in Late 2021.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 39 freegeoip.app 36 freegeoip.app -
Suspicious use of NtSetInformationThreadHideFromDebugger 14 IoCs
Processes:
063adc7edd5785637dff0fe0a606c36b.exepid process 2568 063adc7edd5785637dff0fe0a606c36b.exe 2568 063adc7edd5785637dff0fe0a606c36b.exe 2568 063adc7edd5785637dff0fe0a606c36b.exe 2568 063adc7edd5785637dff0fe0a606c36b.exe 2568 063adc7edd5785637dff0fe0a606c36b.exe 2568 063adc7edd5785637dff0fe0a606c36b.exe 2568 063adc7edd5785637dff0fe0a606c36b.exe 2568 063adc7edd5785637dff0fe0a606c36b.exe 2568 063adc7edd5785637dff0fe0a606c36b.exe 2568 063adc7edd5785637dff0fe0a606c36b.exe 2568 063adc7edd5785637dff0fe0a606c36b.exe 2568 063adc7edd5785637dff0fe0a606c36b.exe 2568 063adc7edd5785637dff0fe0a606c36b.exe 2568 063adc7edd5785637dff0fe0a606c36b.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
063adc7edd5785637dff0fe0a606c36b.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 063adc7edd5785637dff0fe0a606c36b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 063adc7edd5785637dff0fe0a606c36b.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
063adc7edd5785637dff0fe0a606c36b.exepid process 2568 063adc7edd5785637dff0fe0a606c36b.exe 2568 063adc7edd5785637dff0fe0a606c36b.exe 2568 063adc7edd5785637dff0fe0a606c36b.exe 2568 063adc7edd5785637dff0fe0a606c36b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
063adc7edd5785637dff0fe0a606c36b.exedescription pid process Token: SeDebugPrivilege 2568 063adc7edd5785637dff0fe0a606c36b.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
063adc7edd5785637dff0fe0a606c36b.exepid process 2568 063adc7edd5785637dff0fe0a606c36b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\063adc7edd5785637dff0fe0a606c36b.exe"C:\Users\Admin\AppData\Local\Temp\063adc7edd5785637dff0fe0a606c36b.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2568
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105B
MD52e9d094dda5cdc3ce6519f75943a4ff4
SHA15d989b4ac8b699781681fe75ed9ef98191a5096c
SHA256c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142
SHA512d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7
-
Filesize
1KB
MD5d089de0a2bece1c4a7f75de417704dc9
SHA1b73ac979d4d0c54ebc8950b9b4b6cd70a709a7dc
SHA2562d6016ea2ab97dfc298a58ef847473072aad6978889371601772827d0898ca58
SHA5127f85eee05c4d5da68a160e3ea857dfb83a069e3056e77d590cb797021d4da722a10bcdf8c0724b946b35018adced0221309d02006746b3fc5582d613a2c2b999
-
Filesize
1KB
MD54a69f3618baeaee6d8f5b74dd56244b7
SHA12a6dc0a89c9575060825f28bd08ba636bfabd275
SHA25602b4b4d28f23c154d72b91d6184936af37acc43a72effd22836a600caac53914
SHA5120be42611a72a91ac9d6fe5478954ecd6c1b6c0138e43d13bd37797dffc0717bc7195c2c391c5c216e8a90b21d1599713164bf61bfed39d4769e4084aa76e937d
-
Filesize
484B
MD55a05864d8b52c8aba82a06ef5eff745b
SHA1dda1bfb88453f4f0d6af31347d006d733aa51d54
SHA2563581e91284368b4ddd732fac90a8941044d33119401f3b02ef8c89919eec3d60
SHA512187ebb9d9177b8c97da279714c90612c42b5a739578d189b96064baee0be47c89562cbea520a68dab9fd9e063bd14db555e008e2306db5dcab6aa6e31d54c291
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e