Analysis

  • max time kernel
    156s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-01-2024 19:50

General

  • Target

    a12988c8c14e8f9738b5a19df4f2fb68.exe

  • Size

    1.7MB

  • MD5

    a12988c8c14e8f9738b5a19df4f2fb68

  • SHA1

    20f006f38129e1ea031566d61b5b45c292e4913f

  • SHA256

    f0957b9d77cd4228a0cf2ed601b6392048b299cfb4096382638066b637a4127d

  • SHA512

    943193e44c9c46e560e7df4487a39e4e649a19b51574ccf58f3fb31c54e492e41aac4d516fd299611d7f30b6d34166625e0a66b7a05c6020ee32257a06d32838

  • SSDEEP

    49152:FVKNPoyN4N09vO/zyAtr3ziUx3IsggbU/COKqt:FV0taCGbyAlx3dK/JZ

Malware Config

Extracted

Family

blackguard

C2

https://api.telegram.org/bot1815441105:AAFl78w0wG00_bQG4toKipjs8EBYjH37y6o/sendMessage?chat_id=548838106

Signatures

  • 44Caliber

    An open source infostealer written in C#.

  • BlackGuard

    Infostealer first seen in Late 2021.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 15 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a12988c8c14e8f9738b5a19df4f2fb68.exe
    "C:\Users\Admin\AppData\Local\Temp\a12988c8c14e8f9738b5a19df4f2fb68.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:4660

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\44\Browsers\Firefox\Bookmarks.txt

    Filesize

    105B

    MD5

    2e9d094dda5cdc3ce6519f75943a4ff4

    SHA1

    5d989b4ac8b699781681fe75ed9ef98191a5096c

    SHA256

    c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142

    SHA512

    d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7

  • C:\Users\Admin\AppData\Local\44\Process.txt

    Filesize

    1KB

    MD5

    6170320d392e613ddd19eee70b67f0de

    SHA1

    82b9f94cdc0da159b140c5fa3e199143429303ad

    SHA256

    4171a1f0bc985243a7c00d937aec063c13bf23a176f3c4dfc236713092c1f8bb

    SHA512

    4dd56f48e526f3f8ea3b1fa5b714d3bb6ce510f123ec3253c80014c86e371b501f2562777ac7791ca16369248d7ca0c23f94b44db97b428c18877cf09586c707

  • C:\Users\Admin\AppData\Local\44\Process.txt

    Filesize

    1KB

    MD5

    4f76c9ae27bcbbfcd8724cc1cfbcbed4

    SHA1

    519de05bead48589a36f93de79ffa6025642e548

    SHA256

    37f3bc9b4374776524909a8c0d1acb50e76c8522a9f8d3cb0fbf64e87bba94fb

    SHA512

    a5f0e38b295081b0bc37cf544018584321bc697f7301198e0671ddd44bd11393fbda3f8a9e5e522d4e76f71ff50e06180691b9b20cb67f2e3c12b35c5faccfb0

  • C:\Users\Admin\AppData\Local\44\Process.txt

    Filesize

    597B

    MD5

    9995fb1dd6ef0c03d2b7e23b57bba755

    SHA1

    345b006cd5f1b7c0d1266c638b495cce09d67d62

    SHA256

    dd0e31a27ca0570972c3354ef81b31d248d86521373b05c2fb3c7b4a796535a9

    SHA512

    eef1a961a90e805a7ecc264c321e25a30ed23a33dd8bc78cf1ef8ff137ab9db47b52d930b85d3082ec11361f992a488f6007f6d97db4f080196b7bd9d9f6d149

  • C:\Users\Admin\AppData\Local\44\Process.txt

    Filesize

    732B

    MD5

    abaccd0c6c57f65337883c12d6b79825

    SHA1

    75346b4c8ed43e1863ab63e74c9faa7c379e22d2

    SHA256

    f6fe293148922f20e8c7d0c02831cddfd8af1c4fcf4ea30cc7f4628ef1d63908

    SHA512

    47b8b6ee4e1f06a2a78103cb03dc74c138b17152e98c9b36b039e8d3e527c723b8a7e8612daf5b42838dda640b8e9f416fe4d09cc08fd3f8b13625daa65cebc3

  • memory/4660-156-0x0000000007420000-0x0000000007774000-memory.dmp

    Filesize

    3.3MB

  • memory/4660-4-0x0000000003450000-0x0000000003460000-memory.dmp

    Filesize

    64KB

  • memory/4660-42-0x0000000006BE0000-0x0000000007184000-memory.dmp

    Filesize

    5.6MB

  • memory/4660-40-0x0000000000050000-0x0000000000532000-memory.dmp

    Filesize

    4.9MB

  • memory/4660-3-0x0000000000050000-0x0000000000532000-memory.dmp

    Filesize

    4.9MB

  • memory/4660-2-0x00000000745B0000-0x0000000074D60000-memory.dmp

    Filesize

    7.7MB

  • memory/4660-134-0x0000000006A70000-0x0000000006AD6000-memory.dmp

    Filesize

    408KB

  • memory/4660-41-0x0000000006590000-0x0000000006622000-memory.dmp

    Filesize

    584KB

  • memory/4660-136-0x00000000745B0000-0x0000000074D60000-memory.dmp

    Filesize

    7.7MB

  • memory/4660-137-0x0000000003450000-0x0000000003460000-memory.dmp

    Filesize

    64KB

  • memory/4660-1-0x0000000000050000-0x0000000000532000-memory.dmp

    Filesize

    4.9MB

  • memory/4660-152-0x00000000032E0000-0x00000000032EA000-memory.dmp

    Filesize

    40KB

  • memory/4660-153-0x00000000032F0000-0x00000000032F8000-memory.dmp

    Filesize

    32KB

  • memory/4660-155-0x0000000005FC0000-0x0000000005FE2000-memory.dmp

    Filesize

    136KB

  • memory/4660-0-0x0000000000050000-0x0000000000532000-memory.dmp

    Filesize

    4.9MB