Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13-01-2024 11:03
Static task
static1
Behavioral task
behavioral1
Sample
58c1a37139dc07fd0d4d800032cc65d0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
58c1a37139dc07fd0d4d800032cc65d0.exe
Resource
win10v2004-20231215-en
General
-
Target
58c1a37139dc07fd0d4d800032cc65d0.exe
-
Size
1.7MB
-
MD5
58c1a37139dc07fd0d4d800032cc65d0
-
SHA1
62474977ece1d8b71400474d4998497089918c12
-
SHA256
81673703e3620dd4760abc876882185a901fdebdd9db9ec6caad172adce76306
-
SHA512
59dc2d2cf0a321b960af505231d5fbc373abc59a8f5fe2cf6c0c0908d68bb4454a176ba02243334e6331e6d5831c32b08dbd54bc290bbf02dc213f9d6677a365
-
SSDEEP
49152:cuYkCr6/VlG1D3bGTHcQHl3Ll3HoCgn/Pa9MdYxGtbR:QVr6/21yR3h3IC8iKdd9
Malware Config
Extracted
blackguard
https://api.telegram.org/bot1835956767:AAHk1asCy0CiwJAclHm32rLK9Ng48TPYeeA/sendMessage?chat_id=1329554755
Signatures
-
BlackGuard
Infostealer first seen in Late 2021.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 18 freegeoip.app 19 freegeoip.app -
Suspicious use of NtSetInformationThreadHideFromDebugger 15 IoCs
Processes:
58c1a37139dc07fd0d4d800032cc65d0.exepid process 1696 58c1a37139dc07fd0d4d800032cc65d0.exe 1696 58c1a37139dc07fd0d4d800032cc65d0.exe 1696 58c1a37139dc07fd0d4d800032cc65d0.exe 1696 58c1a37139dc07fd0d4d800032cc65d0.exe 1696 58c1a37139dc07fd0d4d800032cc65d0.exe 1696 58c1a37139dc07fd0d4d800032cc65d0.exe 1696 58c1a37139dc07fd0d4d800032cc65d0.exe 1696 58c1a37139dc07fd0d4d800032cc65d0.exe 1696 58c1a37139dc07fd0d4d800032cc65d0.exe 1696 58c1a37139dc07fd0d4d800032cc65d0.exe 1696 58c1a37139dc07fd0d4d800032cc65d0.exe 1696 58c1a37139dc07fd0d4d800032cc65d0.exe 1696 58c1a37139dc07fd0d4d800032cc65d0.exe 1696 58c1a37139dc07fd0d4d800032cc65d0.exe 1696 58c1a37139dc07fd0d4d800032cc65d0.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
58c1a37139dc07fd0d4d800032cc65d0.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 58c1a37139dc07fd0d4d800032cc65d0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 58c1a37139dc07fd0d4d800032cc65d0.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
58c1a37139dc07fd0d4d800032cc65d0.exepid process 1696 58c1a37139dc07fd0d4d800032cc65d0.exe 1696 58c1a37139dc07fd0d4d800032cc65d0.exe 1696 58c1a37139dc07fd0d4d800032cc65d0.exe 1696 58c1a37139dc07fd0d4d800032cc65d0.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
58c1a37139dc07fd0d4d800032cc65d0.exedescription pid process Token: SeDebugPrivilege 1696 58c1a37139dc07fd0d4d800032cc65d0.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
58c1a37139dc07fd0d4d800032cc65d0.exepid process 1696 58c1a37139dc07fd0d4d800032cc65d0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\58c1a37139dc07fd0d4d800032cc65d0.exe"C:\Users\Admin\AppData\Local\Temp\58c1a37139dc07fd0d4d800032cc65d0.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105B
MD52e9d094dda5cdc3ce6519f75943a4ff4
SHA15d989b4ac8b699781681fe75ed9ef98191a5096c
SHA256c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142
SHA512d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7
-
Filesize
308B
MD554bcdc281eb135732ca57ff89c1b50ed
SHA1630237161d5daffe51b348ce3ec10fa834239fcf
SHA2566cda41f444ec739a4e1cbaf8ffd40e485974a571a4871dd2624c575d082fe082
SHA512afd946087de3076506ab3a659ee3e6ed80e2532ee4a5fae9ca72e864408f9d3f69b5a61b331cd6810176ae64887bac94966cc418aadd38dca9da9a24df0c1682
-
Filesize
984B
MD5ada8466c13b2bc67b0d175c7b01217f9
SHA1fb2bfd8dc249017774893cffc4cb1f0ab82e3ad5
SHA256f9c38815f6b5a3b0b6b14b33114eeff844a78ae263a8a2fb83473ee75178264a
SHA512ecd30566d0e441f73c785f581f38dab89e80e7298c0bd54443ed6eec5b43b15c703a02feb7ba37fdcef486b515df69f3144921d67cb372b3172794be7ad4b674
-
Filesize
1KB
MD5f9c937830f8adcf9e63a5c5ef74dba4d
SHA19c9166ca1afedc0ef20042c4f113b18f2ed16de2
SHA256b0bedc9dab2be3acf033455827a9b050112fb3a0b9c46010ad0769530e6d225d
SHA5120393e195df0887ebe6fcc30bb447eb0aa3aa863c921f22d3454e7b6ea5afdd29ccf5d77729b2e4687e519e3da91f91aeed40e6fed75bc9e3022866ba150ca594