Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
06-11-2024 19:11
Static task
static1
Behavioral task
behavioral1
Sample
abd83a56df1bf1854b8d337ae6cb02721e194c2138321fd3d75262f8172760d6.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
abd83a56df1bf1854b8d337ae6cb02721e194c2138321fd3d75262f8172760d6.dll
Resource
win10v2004-20241007-en
General
-
Target
abd83a56df1bf1854b8d337ae6cb02721e194c2138321fd3d75262f8172760d6.dll
-
Size
39KB
-
MD5
7cc8b34f80629abb8bd2c368e60491d5
-
SHA1
2fd26834ccc5611951072b12e59215f77098d2eb
-
SHA256
abd83a56df1bf1854b8d337ae6cb02721e194c2138321fd3d75262f8172760d6
-
SHA512
2ba190576b1e7e48c521e0fe9f3bdf88d4bb0fbb5b481aeb951c9c864eb59bd035a0338354b4d050666913843c08fd1fc5f3560f20672961000b518db7758441
-
SSDEEP
768:5utABoy7TwOGdA6fYfT1U01HyhulyQylvtV2M:EASywOGdA1Tn1ShB5O
Malware Config
Extracted
blackguard
http://223.5.5.5/resolve?name={0}&short=true&_={1}
http://119.29.29.29/d?dn={0}&_={1}
Signatures
-
BlackGuard
Infostealer first seen in Late 2021.
-
Blackguard family
-
Blocklisted process makes network request 2 IoCs
flow pid Process 3 2044 rundll32.exe 4 2044 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 2044 rundll32.exe 2044 rundll32.exe 2044 rundll32.exe 2044 rundll32.exe 2044 rundll32.exe 2044 rundll32.exe 2044 rundll32.exe 2044 rundll32.exe 2044 rundll32.exe 2044 rundll32.exe 2044 rundll32.exe 2044 rundll32.exe 2044 rundll32.exe 2044 rundll32.exe 2044 rundll32.exe 2044 rundll32.exe 2044 rundll32.exe 2044 rundll32.exe 2044 rundll32.exe 2044 rundll32.exe 2044 rundll32.exe 2044 rundll32.exe 2044 rundll32.exe 2044 rundll32.exe 2044 rundll32.exe 2044 rundll32.exe 2044 rundll32.exe 2044 rundll32.exe 2044 rundll32.exe 2044 rundll32.exe 2044 rundll32.exe 2044 rundll32.exe 2044 rundll32.exe 2044 rundll32.exe 2044 rundll32.exe 2044 rundll32.exe 2044 rundll32.exe 2044 rundll32.exe 2044 rundll32.exe 2044 rundll32.exe 2044 rundll32.exe 2044 rundll32.exe 2044 rundll32.exe 2044 rundll32.exe 2044 rundll32.exe 2044 rundll32.exe 2044 rundll32.exe 2044 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2044 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2044 2116 rundll32.exe 30 PID 2116 wrote to memory of 2044 2116 rundll32.exe 30 PID 2116 wrote to memory of 2044 2116 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\abd83a56df1bf1854b8d337ae6cb02721e194c2138321fd3d75262f8172760d6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\abd83a56df1bf1854b8d337ae6cb02721e194c2138321fd3d75262f8172760d6.dll,entry2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2044
-