Analysis
-
max time kernel
142s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07-01-2024 19:42
Static task
static1
Behavioral task
behavioral1
Sample
a4849cead4dfa68295a47c5471422ffd.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
a4849cead4dfa68295a47c5471422ffd.exe
Resource
win10v2004-20231215-en
General
-
Target
a4849cead4dfa68295a47c5471422ffd.exe
-
Size
1.5MB
-
MD5
a4849cead4dfa68295a47c5471422ffd
-
SHA1
c6c5e9a0a3c37c583def626f9bc227c0c294fa8a
-
SHA256
49977d7ebceb8b390b44ed50f6447ce0910c9fc73b1bfdd60eef219138d0038e
-
SHA512
df17c9ecc176bae94aeab4bf5ec6733198e6b961baca50465bce6c2d2acf6cf070ad9b3ed4e6efa64d4beec3d5de24f0cfdcd7ac0c7bd8ddabf810cae324b4a4
-
SSDEEP
24576:CGR2feTKmUp6t23c51lT9y+wvfH79MPxvvdvOyoldbUzkvdHXFcTjYu8AlmeX5J5:CGR2fnn/3cV8+wvzCxlvOyovbUkITjhV
Malware Config
Extracted
blackguard
https://api.telegram.org/bot1818730721:AAGgMZz8w6trwd7tHAnNbu0kJSmYFV_IvXk/sendMessage?chat_id=1610877447
Signatures
-
BlackGuard
Infostealer first seen in Late 2021.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
a4849cead4dfa68295a47c5471422ffd.exepid process 840 a4849cead4dfa68295a47c5471422ffd.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2680 840 WerFault.exe a4849cead4dfa68295a47c5471422ffd.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
a4849cead4dfa68295a47c5471422ffd.exepid process 840 a4849cead4dfa68295a47c5471422ffd.exe 840 a4849cead4dfa68295a47c5471422ffd.exe 840 a4849cead4dfa68295a47c5471422ffd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
a4849cead4dfa68295a47c5471422ffd.exedescription pid process Token: SeDebugPrivilege 840 a4849cead4dfa68295a47c5471422ffd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
a4849cead4dfa68295a47c5471422ffd.exepid process 840 a4849cead4dfa68295a47c5471422ffd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
a4849cead4dfa68295a47c5471422ffd.exedescription pid process target process PID 840 wrote to memory of 2680 840 a4849cead4dfa68295a47c5471422ffd.exe WerFault.exe PID 840 wrote to memory of 2680 840 a4849cead4dfa68295a47c5471422ffd.exe WerFault.exe PID 840 wrote to memory of 2680 840 a4849cead4dfa68295a47c5471422ffd.exe WerFault.exe PID 840 wrote to memory of 2680 840 a4849cead4dfa68295a47c5471422ffd.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4849cead4dfa68295a47c5471422ffd.exe"C:\Users\Admin\AppData\Local\Temp\a4849cead4dfa68295a47c5471422ffd.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 840 -s 10802⤵
- Program crash
PID:2680