Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10-04-2024 16:43

General

  • Target

    eb85c8d233bbc43b89d451aa8980218e_JaffaCakes118.exe

  • Size

    416KB

  • MD5

    eb85c8d233bbc43b89d451aa8980218e

  • SHA1

    e182f64c338e843fe492949ed6011a2492849013

  • SHA256

    2e1064e3bd2d37cd96495c01f326d4a543b77e38045a983e93e99a4704df206f

  • SHA512

    0173784e53521d4a789d69330e241b05cc14e7c27cb7559dc7be65296c5d27bbae4ff9c17f46878ee9654f8f05c116663cab24aa206ebe3943cda02e85bfd335

  • SSDEEP

    6144:XNqXQgfMkh5eWDbhj4uhxGdkrpNJfet3Agp0q9ygbX+1RzDU8:9qXQgUk5d44xGONJsaMJcR/V

Malware Config

Extracted

Family

blackguard

C2

https://api.telegram.org/bot1711224512:AAG22Nlr-jO4MyOqR-e8u_WyFQ4Bw7rDtVw/sendMessage?chat_id=1640241476

Signatures

  • BlackGuard

    Infostealer first seen in Late 2021.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Obfuscated with Agile.Net obfuscator 1 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eb85c8d233bbc43b89d451aa8980218e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eb85c8d233bbc43b89d451aa8980218e_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2300
    • C:\Users\Admin\AppData\Local\Temp\AgileDotNetProtector.exe
      "C:\Users\Admin\AppData\Local\Temp\AgileDotNetProtector.exe"
      2⤵
      • Executes dropped EXE
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2916

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\AgileDotNetProtector.exe

    Filesize

    238KB

    MD5

    0273f470f69e65f8daf2d941a758e244

    SHA1

    541eaed915315e04b004c547ef35d6aab5e51eed

    SHA256

    c1d8695dd3ba81fb11577f050e032b5080716d69c61f410314221f5794c930ba

    SHA512

    789f2949545fe711a4c2fff029b17e0f2edea0541b764991583f4cac91faadc207ce608887bf6b6f7ac92f680c32aa2a9e1e5d95b27706fbc603b062b1cdc842

  • C:\Users\Admin\AppData\Roaming\VPFHNTLZyXBDDuNZLPJHFXVVwKXIPPCKF.Admin\Process.txt

    Filesize

    225B

    MD5

    ada862d4262f99cb0e56f20723ee83f9

    SHA1

    7aa243ffb3f12b2ff54eedbb67ad42d4ceaf253c

    SHA256

    53c0d85f26b02c5c89a3e1eae810899d67f58c908604feee6da9471526f10f43

    SHA512

    0ede6ddfdb4887a506342fe625cac0a18cb0816d02ee2ba75e522787e375fb7e018a625c4d206931d04715ca2774eb0c2cfa5c729c99ba9c62a84f258cdd3bab

  • C:\Users\Admin\AppData\Roaming\VPFHNTLZyXBDDuNZLPJHFXVVwKXIPPCKF.Admin\Process.txt

    Filesize

    439B

    MD5

    5d4855042c97a91fc3552b306b23ad8f

    SHA1

    0a9b19796b494ee31225e539d7149905f6ab64cb

    SHA256

    5063d036c776c400d25b9be082d71ed8ae17cd82f25e4303096388a3a625b0bf

    SHA512

    522d72b8af77eff44589a477ce10368637d7a469f870cecc55871067d584da3cbc197091141fc196102006d5cbc82e676788be46d0a60c0d4b5e8674a5461563

  • \Users\Admin\AppData\Local\Temp\9a378694-488e-4b83-b03b-9635debd61af\ .dll

    Filesize

    141KB

    MD5

    e8641f344213ca05d8b5264b5f4e2dee

    SHA1

    96729e31f9b805800b2248fd22a4b53e226c8309

    SHA256

    85e82b9e9200e798e8f434459eacee03ed9818cc6c9a513fe083e72d48884e24

    SHA512

    3130f32c100ecb97083ad8ac4c67863e9ceed3a9b06fc464d1aeeaec389f74c8bf56f4ce04f6450fd2cc0fa861d085101c433cfa4bec3095f8ebeeb53b739109

  • memory/2300-9-0x000007FEFB240000-0x000007FEFB268000-memory.dmp

    Filesize

    160KB

  • memory/2300-10-0x000007FEF4080000-0x000007FEF41AC000-memory.dmp

    Filesize

    1.2MB

  • memory/2300-0-0x0000000000F80000-0x0000000000FEE000-memory.dmp

    Filesize

    440KB

  • memory/2300-2-0x000000001AF60000-0x000000001AFE0000-memory.dmp

    Filesize

    512KB

  • memory/2300-1-0x000007FEF5740000-0x000007FEF612C000-memory.dmp

    Filesize

    9.9MB

  • memory/2300-82-0x000007FEFB240000-0x000007FEFB268000-memory.dmp

    Filesize

    160KB

  • memory/2300-81-0x000007FEF5740000-0x000007FEF612C000-memory.dmp

    Filesize

    9.9MB

  • memory/2916-17-0x00000000013B0000-0x00000000013F2000-memory.dmp

    Filesize

    264KB

  • memory/2916-18-0x0000000074390000-0x0000000074A7E000-memory.dmp

    Filesize

    6.9MB

  • memory/2916-19-0x0000000004E60000-0x0000000004EA0000-memory.dmp

    Filesize

    256KB

  • memory/2916-80-0x0000000074390000-0x0000000074A7E000-memory.dmp

    Filesize

    6.9MB