Analysis

  • max time kernel
    147s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-05-2024 01:34

General

  • Target

    1a7e1dbc5b581983480ab7e941caa2fef0867dbf158a05afdb22a3bc97a4f735.exe

  • Size

    2.0MB

  • MD5

    9b1452092551f69de62bd2901a890fc7

  • SHA1

    e425f6a76b0a71938fa4713377598d8f3165f766

  • SHA256

    1a7e1dbc5b581983480ab7e941caa2fef0867dbf158a05afdb22a3bc97a4f735

  • SHA512

    f9bd83226d0927ab9d98bea8e720272fa779edfcbb0f7b3aefa76a6960e87f9cc2efe2a6108a2e9f285962318f6d8054c6cc89bf10e445933c145c3d6d2e73e7

  • SSDEEP

    49152:1Tq24GjdGS0mrgBWBKH8jkDVFCNXODzWS9HfX0H0han:AEjdGSi+KH4kpc+DX/0H0W

Score
10/10

Malware Config

Signatures

  • BlackGuard

    Infostealer first seen in Late 2021.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1a7e1dbc5b581983480ab7e941caa2fef0867dbf158a05afdb22a3bc97a4f735.exe
    "C:\Users\Admin\AppData\Local\Temp\1a7e1dbc5b581983480ab7e941caa2fef0867dbf158a05afdb22a3bc97a4f735.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:4192

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4192-0-0x000000007520E000-0x000000007520F000-memory.dmp

    Filesize

    4KB

  • memory/4192-1-0x0000000000CE0000-0x0000000000EE0000-memory.dmp

    Filesize

    2.0MB

  • memory/4192-2-0x0000000006020000-0x00000000065C4000-memory.dmp

    Filesize

    5.6MB

  • memory/4192-3-0x0000000005780000-0x0000000005812000-memory.dmp

    Filesize

    584KB

  • memory/4192-4-0x0000000005830000-0x000000000583A000-memory.dmp

    Filesize

    40KB

  • memory/4192-5-0x0000000075200000-0x00000000759B0000-memory.dmp

    Filesize

    7.7MB

  • memory/4192-6-0x0000000005B70000-0x0000000005F76000-memory.dmp

    Filesize

    4.0MB

  • memory/4192-7-0x0000000075200000-0x00000000759B0000-memory.dmp

    Filesize

    7.7MB

  • memory/4192-8-0x0000000075200000-0x00000000759B0000-memory.dmp

    Filesize

    7.7MB

  • memory/4192-9-0x0000000075200000-0x00000000759B0000-memory.dmp

    Filesize

    7.7MB

  • memory/4192-10-0x0000000009650000-0x000000000965E000-memory.dmp

    Filesize

    56KB

  • memory/4192-11-0x000000007520E000-0x000000007520F000-memory.dmp

    Filesize

    4KB

  • memory/4192-12-0x0000000075200000-0x00000000759B0000-memory.dmp

    Filesize

    7.7MB

  • memory/4192-13-0x0000000075200000-0x00000000759B0000-memory.dmp

    Filesize

    7.7MB