Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    20-06-2024 01:17

General

  • Target

    59995687fb6d23f8a2ed27cea80df13af791f581e029b83903606f262b4bb4af.exe

  • Size

    11.3MB

  • MD5

    8867e727cdd2f7e89ecbf5bd7300be8b

  • SHA1

    0ce9927ef786a96bd7280913a41cccd85289a461

  • SHA256

    59995687fb6d23f8a2ed27cea80df13af791f581e029b83903606f262b4bb4af

  • SHA512

    44cec2dcd346a0513b71b0cb967c6c0ed5e38654f207a99a1831a2bcab6de1a41f8c5d2acf51e3587507df90429b19f02a77c7faa3129ca4695bf3e1a85d68ca

  • SSDEEP

    98304:zfHMKz89taGALzwMIAj4xAR6HhMIQQCYFhMD+SNfCWtw6MD+SNfCWtwGdYx:TXAHKzEAWwIhMIQQQRtwbRtwGKx

Score
10/10

Malware Config

Signatures

  • BlackGuard

    Infostealer first seen in Late 2021.

  • Loads dropped DLL 3 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\59995687fb6d23f8a2ed27cea80df13af791f581e029b83903606f262b4bb4af.exe
    "C:\Users\Admin\AppData\Local\Temp\59995687fb6d23f8a2ed27cea80df13af791f581e029b83903606f262b4bb4af.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1676
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 1676 -s 2104
      2⤵
        PID:868

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Cab1383.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar4E35.tmp

      Filesize

      171KB

      MD5

      9c0c641c06238516f27941aa1166d427

      SHA1

      64cd549fb8cf014fcd9312aa7a5b023847b6c977

      SHA256

      4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

      SHA512

      936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

    • \Users\Admin\AppData\Local\Temp\de1002d9-b6fc-4054-ba54-2f4d9037771e\LockheedMartin.Prepar3D.SimConnect.dll

      Filesize

      292KB

      MD5

      3d51d920b416ceb1c2354d7b1d5bb9a9

      SHA1

      dc7c6ce78a2e62610bb4b3fb6ce2b1967ce022b7

      SHA256

      647ecc661d2c072a8b3567864a5ea4cf3797487e32488472192b4741320d1813

      SHA512

      dcc39102b83ffd0dc1825319c4584b5e193f77173be9afbc51b7b6fd30084798d4bd2da393fc315af9011b0f2ea5309473666536457e2fcd9a2b1fcc8bec4dc3

    • memory/1676-45-0x0000000000650000-0x0000000000662000-memory.dmp

      Filesize

      72KB

    • memory/1676-47-0x000000001C6D0000-0x000000001C778000-memory.dmp

      Filesize

      672KB

    • memory/1676-3-0x000007FEF5953000-0x000007FEF5954000-memory.dmp

      Filesize

      4KB

    • memory/1676-2-0x000007FEF5950000-0x000007FEF633C000-memory.dmp

      Filesize

      9.9MB

    • memory/1676-44-0x000007FEF5950000-0x000007FEF633C000-memory.dmp

      Filesize

      9.9MB

    • memory/1676-0-0x000007FEF5953000-0x000007FEF5954000-memory.dmp

      Filesize

      4KB

    • memory/1676-46-0x0000000000660000-0x0000000000668000-memory.dmp

      Filesize

      32KB

    • memory/1676-4-0x000007FEF5950000-0x000007FEF633C000-memory.dmp

      Filesize

      9.9MB

    • memory/1676-49-0x0000000000E70000-0x0000000000EC0000-memory.dmp

      Filesize

      320KB

    • memory/1676-48-0x000000001C410000-0x000000001C494000-memory.dmp

      Filesize

      528KB

    • memory/1676-1-0x0000000000FF0000-0x0000000001B38000-memory.dmp

      Filesize

      11.3MB

    • memory/1676-54-0x000000001B3A0000-0x000000001B3F0000-memory.dmp

      Filesize

      320KB

    • memory/1676-65-0x000000001D8A0000-0x000000001DB0E000-memory.dmp

      Filesize

      2.4MB

    • memory/1676-68-0x000007FEF5950000-0x000007FEF633C000-memory.dmp

      Filesize

      9.9MB