Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    26-07-2024 01:26

General

  • Target

    23cba733913c068f57b5d656072cf1b0acc32e0bce2b6d8f3742b582e7fba724.exe

  • Size

    1.7MB

  • MD5

    7e2353b59111a0f5ae3a78324302a803

  • SHA1

    59ddb18039965b4f44baebac0ba58cdb86217a43

  • SHA256

    23cba733913c068f57b5d656072cf1b0acc32e0bce2b6d8f3742b582e7fba724

  • SHA512

    bd4c9d03bb5df0a1d43bca4414ed167647da984eef69a6ee2f4a3f2579f7e20bd61b1a9e0e30809155d25226454036bc7ef8ab3689e96d884b0857c7e80abb13

  • SSDEEP

    24576:rJTbNFzK+V1e0R0/1+0/2FSxHhCgxTYJlTm97:s+nIHzYyR

Malware Config

Signatures

  • BlackGuard

    Infostealer first seen in Late 2021.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\23cba733913c068f57b5d656072cf1b0acc32e0bce2b6d8f3742b582e7fba724.exe
    "C:\Users\Admin\AppData\Local\Temp\23cba733913c068f57b5d656072cf1b0acc32e0bce2b6d8f3742b582e7fba724.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1544
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1544 -s 528
      2⤵
      • Program crash
      PID:2760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1544-0-0x000000007462E000-0x000000007462F000-memory.dmp

    Filesize

    4KB

  • memory/1544-1-0x0000000000F40000-0x0000000001100000-memory.dmp

    Filesize

    1.8MB

  • memory/1544-2-0x000000007462E000-0x000000007462F000-memory.dmp

    Filesize

    4KB