Analysis
-
max time kernel
90s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29-02-2024 06:55
Static task
static1
Behavioral task
behavioral1
Sample
Backdoor.Win32.Poison.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Backdoor.Win32.Poison.exe
Resource
win10v2004-20240226-en
General
-
Target
Backdoor.Win32.Poison.exe
-
Size
7.7MB
-
MD5
6584904d4b82003ab55cc4e409e3c3d1
-
SHA1
00c2fdbad40ef28ee824930d6f951d8cc4cdbd22
-
SHA256
9ded158155f6ea7b0546f7b9f4232c6ab8a83dfa4a4a4541ad568c40701ccf63
-
SHA512
a4a0cdeb31b23f2abf4524354f9b1ab83c348ceb5f6c200db72cd0768dfe50f2ae4c6562ee9f6b1fe5e342ba1d61654bbf92d853aebda1d8c24d29da5184b41e
-
SSDEEP
196608:7SsB3UHB58UTesBenxj2xwMz8Yi9pZpVU/E/YJsaMf:7SKkftTesBUWbotpKJsaS
Malware Config
Extracted
blackguard
https://api.telegram.org/bot6998282917:AAFTftoiI1iDK69cdnpTF9-X_NW2zLUTJMQ/sendMessage?chat_id=6569859833
Signatures
-
BlackGuard
Infostealer first seen in Late 2021.
-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 2 IoCs
resource yara_rule behavioral2/files/0x00070000000231ea-22.dat INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/112-30-0x00000000001A0000-0x00000000001EA000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers -
Detects executables containing SQL queries to confidential data stores. Observed in infostealers 2 IoCs
resource yara_rule behavioral2/files/0x00070000000231ea-22.dat INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore behavioral2/memory/112-30-0x00000000001A0000-0x00000000001EA000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore -
Detects executables containing common artifacts observed in infostealers 2 IoCs
resource yara_rule behavioral2/files/0x00070000000231ea-22.dat INDICATOR_SUSPICIOUS_GENInfoStealer behavioral2/memory/112-30-0x00000000001A0000-0x00000000001EA000-memory.dmp INDICATOR_SUSPICIOUS_GENInfoStealer -
Detects executables referencing Discord tokens regular expressions 3 IoCs
resource yara_rule behavioral2/files/0x00070000000231ea-22.dat INDICATOR_SUSPICIOUS_EXE_Discord_Regex behavioral2/memory/112-30-0x00000000001A0000-0x00000000001EA000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Discord_Regex behavioral2/memory/112-32-0x0000000004B10000-0x0000000004B20000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Discord_Regex -
Detects executables referencing credit card regular expressions 3 IoCs
resource yara_rule behavioral2/files/0x00070000000231ea-22.dat INDICATOR_SUSPICIOUS_EXE_CC_Regex behavioral2/memory/112-30-0x00000000001A0000-0x00000000001EA000-memory.dmp INDICATOR_SUSPICIOUS_EXE_CC_Regex behavioral2/memory/112-32-0x0000000004B10000-0x0000000004B20000-memory.dmp INDICATOR_SUSPICIOUS_EXE_CC_Regex -
Detects executables referencing many VPN software clients. Observed in infosteslers 2 IoCs
resource yara_rule behavioral2/files/0x00070000000231ea-22.dat INDICATOR_SUSPICIOUS_EXE_References_VPN behavioral2/memory/112-30-0x00000000001A0000-0x00000000001EA000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_VPN -
Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers 2 IoCs
resource yara_rule behavioral2/files/0x00070000000231ea-22.dat INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/112-30-0x00000000001A0000-0x00000000001EA000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store -
Detects executables using Telegram Chat Bot 2 IoCs
resource yara_rule behavioral2/files/0x00070000000231ea-22.dat INDICATOR_SUSPICIOUS_EXE_TelegramChatBot behavioral2/memory/112-30-0x00000000001A0000-0x00000000001EA000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TelegramChatBot -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Backdoor.Win32.Poison.exe -
Executes dropped EXE 1 IoCs
pid Process 112 v2.exe -
Loads dropped DLL 5 IoCs
pid Process 112 v2.exe 112 v2.exe 112 v2.exe 112 v2.exe 112 v2.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 9 freegeoip.app 12 freegeoip.app 34 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier v2.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 v2.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 112 v2.exe 112 v2.exe 112 v2.exe 112 v2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 112 v2.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2500 wrote to memory of 112 2500 Backdoor.Win32.Poison.exe 89 PID 2500 wrote to memory of 112 2500 Backdoor.Win32.Poison.exe 89 PID 2500 wrote to memory of 112 2500 Backdoor.Win32.Poison.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\Backdoor.Win32.Poison.exe"C:\Users\Admin\AppData\Local\Temp\Backdoor.Win32.Poison.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\v2.exe"C:\Users\Admin\AppData\Local\Temp\v2.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
571KB
MD5169b6d383b7c650ab3ae2129397a6cf3
SHA1fcaef7defb04301fd55fb1421bb15ef96d7040d6
SHA256b896083feb2bdedc1568b62805dbd354c55e57f2d2469a52aec6c98f4ec2dedf
SHA5127a7a7bdb508b8bf177249251c83b65a2ef4a5d8b29397cab130cb8444b23888678673a9a2e4b1c74cc095b358f923b9e7e5a91bfa8c240412d95765851f1dd87
-
Filesize
1.3MB
MD50a1e95b0b1535203a1b8479dff2c03ff
SHA120c4b4406e8a3b1b35ca739ed59aa07ba867043d
SHA256788d748b4d35dfd091626529457d91e9ebc8225746211086b14fb4a25785a51e
SHA512854abcca8d807a98a9ad0ca5d2e55716c3ce26fae7ee4642796baf415c3cfad522b658963eafe504ecaed6c2ecdcdf332c9b01e43dfa342fcc5ca0fbedfe600e
-
Filesize
410KB
MD5056d3fcaf3b1d32ff25f513621e2a372
SHA1851740bca46bab71d0b1d47e47f3eb8358cbee03
SHA25666b64362664030bff1596cda2ec5bd5df48cc7c8313c32f771db4aa30a3f86f9
SHA512ce47c581538f48a46d70279a62c702195beacbfafb48a5a862b3922625fe56f6887d1679c6d9366f946d3d2124cb31c2a3eacbbd14d601ea56e66575cdf46180
-
Filesize
271KB
MD51b306d023f27875521a7e0fea2314286
SHA197c508b280e15903121b6042c6133351a53e68b1
SHA256e9117cc30d4ee4727d5b7f77b2fab14ff86a8aa829e4d639929d755445da4fbf
SHA512e83d78249645dac79d1a2b829fe468d7ec62166d40792b1601e9fac51b5cc57117152cf5dad8410a72dc1ce062f7e6fa368bb71720a04267e69c3fb376d8993e
-
Filesize
105B
MD52e9d094dda5cdc3ce6519f75943a4ff4
SHA15d989b4ac8b699781681fe75ed9ef98191a5096c
SHA256c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142
SHA512d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7
-
Filesize
759B
MD55db4b18602232abe2e9f8099238d2a07
SHA100138d18133e3d51fb2ba0abe7355e16a38cff80
SHA256311c91f2e6070f59512d5dac2968c4b5cd074366b3ed743e78e540643d2a105f
SHA512a62e0428f00243d384b3b0aac975c140fda5fe8edd6f2b684e570b3983f258c791f17261d021cf337671e5ed773c663b5330700d752cb9bb9d44459ab5ad4522
-
Filesize
1KB
MD55d66ebb8baa234dbe0a1d6826693c009
SHA19131bf45397c620755f30cc130e58ba8af7197b6
SHA256be43fd4cc3945e2454322a4f473b0cd18b2906b6cca2a4827d98b42675ca4428
SHA51266de9d21a67addcba6ff04dea9eacd44083364bf8191c52641e88a6efdefa48cca696c47d5663000763eb64aee97d4d7dc7ffe613cb4464994c79a81ec0c0ffe