Analysis
-
max time kernel
443s -
max time network
457s -
platform
windows11-21h2_x64 -
resource
win11-20231215-en -
resource tags
arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system -
submitted
03-01-2024 12:33
Static task
static1
Behavioral task
behavioral1
Sample
Domashka.exe
Resource
win11-20231215-en
General
-
Target
Domashka.exe
-
Size
7.7MB
-
MD5
86e863875266e8345097c29d15741a8b
-
SHA1
ab5524d7f698de5928397f3506645ba952103e4a
-
SHA256
bb5d7edc909a7ea29836a501dddd5244d33d342ec6f75c1cf201f14ed55802ac
-
SHA512
22528bbe743825dbfb09743d2824ad5220125e3240bd4d0bd2f87bdc7d46a259aebc08a6fc2e75d6119d881742348fcde90e05142eaa4f29d9c2bbe88f2ae8d5
-
SSDEEP
196608:lX5lladq1hZvawTVNi1Fg6rTSGRzyEjNoi5d7nWO7:lHq6vFTIFg63R5j2E7nWG
Malware Config
Extracted
blackguard
https://api.telegram.org/bot6694446290:AAHhatGdMQTZc2j8T6IAfes0OfC6QMBYYSg/sendMessage?chat_id=6485360129
Signatures
-
BlackGuard
Infostealer first seen in Late 2021.
-
Executes dropped EXE 1 IoCs
pid Process 3844 v2.exe -
Loads dropped DLL 5 IoCs
pid Process 3844 v2.exe 3844 v2.exe 3844 v2.exe 3844 v2.exe 3844 v2.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 freegeoip.app 1 ip-api.com 2 freegeoip.app -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 v2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier v2.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3844 v2.exe 3844 v2.exe 3844 v2.exe 3844 v2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3844 v2.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2016 wrote to memory of 3844 2016 Domashka.exe 79 PID 2016 wrote to memory of 3844 2016 Domashka.exe 79 PID 2016 wrote to memory of 3844 2016 Domashka.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\Domashka.exe"C:\Users\Admin\AppData\Local\Temp\Domashka.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\v2.exe"C:\Users\Admin\AppData\Local\Temp\v2.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
571KB
MD5169b6d383b7c650ab3ae2129397a6cf3
SHA1fcaef7defb04301fd55fb1421bb15ef96d7040d6
SHA256b896083feb2bdedc1568b62805dbd354c55e57f2d2469a52aec6c98f4ec2dedf
SHA5127a7a7bdb508b8bf177249251c83b65a2ef4a5d8b29397cab130cb8444b23888678673a9a2e4b1c74cc095b358f923b9e7e5a91bfa8c240412d95765851f1dd87
-
Filesize
1.3MB
MD50a1e95b0b1535203a1b8479dff2c03ff
SHA120c4b4406e8a3b1b35ca739ed59aa07ba867043d
SHA256788d748b4d35dfd091626529457d91e9ebc8225746211086b14fb4a25785a51e
SHA512854abcca8d807a98a9ad0ca5d2e55716c3ce26fae7ee4642796baf415c3cfad522b658963eafe504ecaed6c2ecdcdf332c9b01e43dfa342fcc5ca0fbedfe600e
-
Filesize
410KB
MD5056d3fcaf3b1d32ff25f513621e2a372
SHA1851740bca46bab71d0b1d47e47f3eb8358cbee03
SHA25666b64362664030bff1596cda2ec5bd5df48cc7c8313c32f771db4aa30a3f86f9
SHA512ce47c581538f48a46d70279a62c702195beacbfafb48a5a862b3922625fe56f6887d1679c6d9366f946d3d2124cb31c2a3eacbbd14d601ea56e66575cdf46180
-
Filesize
271KB
MD585a93044109a70f1bb119d78966a2e4d
SHA17ecf238e536cf12fa3ff3e57b984f8f147c21266
SHA256433b73b437ad4dd138d5a6a8cea12a4ff7bf93c2c9dc11844ab635b83638ebb8
SHA51230656d405995e5dfc38bd6504463b7290b72f635b6773c1d58b116ee43f3afe0d14eae118139e43448446b6a0ffa4098bbec77ff8580b8df210b32ef1f522691
-
Filesize
105B
MD52e9d094dda5cdc3ce6519f75943a4ff4
SHA15d989b4ac8b699781681fe75ed9ef98191a5096c
SHA256c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142
SHA512d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7
-
Filesize
1KB
MD5e5e17d050f6245636efca5cd4828c424
SHA19361a03ee5d617c11f6cf7b97b52a17d4cc75618
SHA256a16460aa59a24ea9529c5c47667b956c8e08fd79aae4410b6c246f50ef934b59
SHA51218488d29c6892355500682aab479966b294f2eb85a91e035933997a6577769f04c6b4077cfdb25af8e91e3a13a3a6a543bfe41a73721e41959a12d57e9170b36