Analysis
-
max time kernel
147s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 19:07
Static task
static1
Behavioral task
behavioral1
Sample
abd83a56df1bf1854b8d337ae6cb02721e194c2138321fd3d75262f8172760d6.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
abd83a56df1bf1854b8d337ae6cb02721e194c2138321fd3d75262f8172760d6.dll
Resource
win10v2004-20241007-en
General
-
Target
abd83a56df1bf1854b8d337ae6cb02721e194c2138321fd3d75262f8172760d6.dll
-
Size
39KB
-
MD5
7cc8b34f80629abb8bd2c368e60491d5
-
SHA1
2fd26834ccc5611951072b12e59215f77098d2eb
-
SHA256
abd83a56df1bf1854b8d337ae6cb02721e194c2138321fd3d75262f8172760d6
-
SHA512
2ba190576b1e7e48c521e0fe9f3bdf88d4bb0fbb5b481aeb951c9c864eb59bd035a0338354b4d050666913843c08fd1fc5f3560f20672961000b518db7758441
-
SSDEEP
768:5utABoy7TwOGdA6fYfT1U01HyhulyQylvtV2M:EASywOGdA1Tn1ShB5O
Malware Config
Extracted
blackguard
http://223.5.5.5/resolve?name={0}&short=true&_={1}
http://119.29.29.29/d?dn={0}&_={1}
Signatures
-
BlackGuard
Infostealer first seen in Late 2021.
-
Blackguard family
-
Blocklisted process makes network request 2 IoCs
flow pid Process 4 1020 rundll32.exe 7 1020 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 51 IoCs
pid Process 1020 rundll32.exe 1020 rundll32.exe 1020 rundll32.exe 1020 rundll32.exe 1020 rundll32.exe 1020 rundll32.exe 1020 rundll32.exe 1020 rundll32.exe 1020 rundll32.exe 1020 rundll32.exe 1020 rundll32.exe 1020 rundll32.exe 1020 rundll32.exe 1020 rundll32.exe 1020 rundll32.exe 1020 rundll32.exe 1020 rundll32.exe 1020 rundll32.exe 1020 rundll32.exe 1020 rundll32.exe 1020 rundll32.exe 1020 rundll32.exe 1020 rundll32.exe 1020 rundll32.exe 1020 rundll32.exe 1020 rundll32.exe 1020 rundll32.exe 1020 rundll32.exe 1020 rundll32.exe 1020 rundll32.exe 1020 rundll32.exe 1020 rundll32.exe 1020 rundll32.exe 1020 rundll32.exe 1020 rundll32.exe 1020 rundll32.exe 1020 rundll32.exe 1020 rundll32.exe 1020 rundll32.exe 1020 rundll32.exe 1020 rundll32.exe 1020 rundll32.exe 1020 rundll32.exe 1020 rundll32.exe 1020 rundll32.exe 1020 rundll32.exe 1020 rundll32.exe 1020 rundll32.exe 1020 rundll32.exe 1020 rundll32.exe 1020 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1020 rundll32.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4748 wrote to memory of 1020 4748 rundll32.exe 83 PID 4748 wrote to memory of 1020 4748 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\abd83a56df1bf1854b8d337ae6cb02721e194c2138321fd3d75262f8172760d6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\abd83a56df1bf1854b8d337ae6cb02721e194c2138321fd3d75262f8172760d6.dll,entry2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1020
-