Analysis

  • max time kernel
    117s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    31-12-2023 10:16

General

  • Target

    32595ac79386e97e05f876c5dd2ab874.exe

  • Size

    1.7MB

  • MD5

    32595ac79386e97e05f876c5dd2ab874

  • SHA1

    c989b9d5095373707323209898e9af47d695b289

  • SHA256

    9935470ff0da61daff7361e3376f0a40401757e4d0ce6c20f07333bc6f041085

  • SHA512

    46a1592acee78ed4104bd68830f23665ac0cbbe8be1734c57d0b393b0a9daeabcfafee13f0083447a842c3578cd3d99cc18dbeb0eff3a0f0582f349b12ca068d

  • SSDEEP

    49152:RTaXfndwbmGJMZeFNOHoabDvhn0TKfurQqlnJfVWncA0xGM:RTkft2NVabD10TKfoFu50/

Malware Config

Extracted

Family

blackguard

C2

https://api.telegram.org/bot1780840566:AAGlajN7Tzg16_1IyBIF3IbdIk9kg_wlmYw/sendMessage?chat_id=397349583

Signatures

  • 44Caliber

    An open source infostealer written in C#.

  • BlackGuard

    Infostealer first seen in Late 2021.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\32595ac79386e97e05f876c5dd2ab874.exe
    "C:\Users\Admin\AppData\Local\Temp\32595ac79386e97e05f876c5dd2ab874.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Checks processor information in registry
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1736

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\44\Browsers\Firefox\Bookmarks.txt
    Filesize

    105B

    MD5

    2e9d094dda5cdc3ce6519f75943a4ff4

    SHA1

    5d989b4ac8b699781681fe75ed9ef98191a5096c

    SHA256

    c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142

    SHA512

    d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7

  • C:\Users\Admin\AppData\Local\44\Process.txt
    Filesize

    126B

    MD5

    53ba2e5fe98a6fe0278ac039767ad370

    SHA1

    cbdaf4a9662ea24db23943b710963e2175233f90

    SHA256

    b1c3258d33dd221e9a10b1fa93cd669c9ad4a5e3bc896eb070c59b1166b5a612

    SHA512

    fedbe380ab2e0f913e7617ca55a1e0db51c8f70f43486b1ac8d98f79f34df86c22119c2ab204dfc43aa3459649f07125dfe19bd70586a68e2b8a7baeaf9109b4

  • C:\Users\Admin\AppData\Local\44\Process.txt
    Filesize

    397B

    MD5

    745beb26c9200b31b93ba40a0d20b91b

    SHA1

    4c5c270e1e5f4a56d4b0c8750aeb235f4801991a

    SHA256

    2a33d13cc146518ed53e2a5fbb7a5ff3962d798a2713467c0001b44c8aea7d17

    SHA512

    08c3864e7992431616024e81cb3d2a7ec20f41db12ba290b10b7d17f3df2480a59b7055eddd3d3e343ed8e780ff2ae107897e172a26bee2c8f57c4ce7ffdad85

  • memory/1736-0-0x0000000000200000-0x00000000006E2000-memory.dmp
    Filesize

    4.9MB

  • memory/1736-2-0x0000000074940000-0x000000007502E000-memory.dmp
    Filesize

    6.9MB

  • memory/1736-1-0x0000000000200000-0x00000000006E2000-memory.dmp
    Filesize

    4.9MB

  • memory/1736-3-0x0000000003470000-0x00000000034B0000-memory.dmp
    Filesize

    256KB

  • memory/1736-69-0x0000000074940000-0x000000007502E000-memory.dmp
    Filesize

    6.9MB

  • memory/1736-87-0x0000000003230000-0x000000000323A000-memory.dmp
    Filesize

    40KB

  • memory/1736-88-0x0000000003240000-0x0000000003248000-memory.dmp
    Filesize

    32KB

  • memory/1736-92-0x0000000074940000-0x000000007502E000-memory.dmp
    Filesize

    6.9MB

  • memory/1736-91-0x0000000000200000-0x00000000006E2000-memory.dmp
    Filesize

    4.9MB