Overview
overview
8Static
static
3PBCCRCPass...ge.exe
windows7-x64
8PBCCRCPass...ge.exe
windows10-2004-x64
8PBCCRCPassGuardX.exe
windows7-x64
3PBCCRCPassGuardX.exe
windows10-2004-x64
3PBCCRCPass...ut.exe
windows7-x64
5PBCCRCPass...ut.exe
windows10-2004-x64
5PBCCRCPass...ce.exe
windows7-x64
5PBCCRCPass...ce.exe
windows10-2004-x64
5Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-11-2024 19:49
Static task
static1
Behavioral task
behavioral1
Sample
PBCCRCPassGuardEdge.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PBCCRCPassGuardEdge.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
PBCCRCPassGuardX.exe
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
PBCCRCPassGuardX.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
PBCCRCPassGuardXInput.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
PBCCRCPassGuardXInput.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
PBCCRCPassGuardXInputService.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
PBCCRCPassGuardXInputService.exe
Resource
win10v2004-20241007-en
General
-
Target
PBCCRCPassGuardXInput.exe
-
Size
2.2MB
-
MD5
711a4cff055438d5d09ca435f0f14711
-
SHA1
1cd82ddcb7f0a6c03631e8f94d137ddfa056eb6d
-
SHA256
e1a00202904b2606777b69c23bc6b432c68400ce2913c3e9bc480f4062957dec
-
SHA512
cec702983ba3d1db5a6a06a9b5265d5943a1c5c5c015e15dc0d4fb34ab9443cea8285bd6b85db2f4f2ce69c49e59752bc9c3be7081c9d1346a2e57eaae155f9a
-
SSDEEP
49152:PFWocvooVzlMClwnbPhwDhOp/Qo0MZ8BRZ0ibMD7IanoI8ovn:PFWocQoVhl2wV63DZ83RgD7zf
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3464 PBCCRCPassGuardXInput.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PBCCRCPassGuardXInput.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3904 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3464 PBCCRCPassGuardXInput.exe 3464 PBCCRCPassGuardXInput.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3464 wrote to memory of 1400 3464 PBCCRCPassGuardXInput.exe 86 PID 3464 wrote to memory of 1400 3464 PBCCRCPassGuardXInput.exe 86 PID 3464 wrote to memory of 1400 3464 PBCCRCPassGuardXInput.exe 86 PID 3464 wrote to memory of 3904 3464 PBCCRCPassGuardXInput.exe 88 PID 3464 wrote to memory of 3904 3464 PBCCRCPassGuardXInput.exe 88 PID 3464 wrote to memory of 3904 3464 PBCCRCPassGuardXInput.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\PBCCRCPassGuardXInput.exe"C:\Users\Admin\AppData\Local\Temp\PBCCRCPassGuardXInput.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Windows\SysWOW64\schtasks.exeC:\Windows\system32\schtasks.exe /delete /tn "ÈËÐÐÕ÷ÐÅ°²È«¿Ø¼þ°²È«ÊäÈë³ÌÐò" /f2⤵
- System Location Discovery: System Language Discovery
PID:1400
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\system32\schtasks.exe /create /tn "ÈËÐÐÕ÷ÐÅ°²È«¿Ø¼þ°²È«ÊäÈë³ÌÐò" /tr "C:\Users\Admin\AppData\Local\Temp\PBCCRCPassGuardXInput.exe" /sc onlogon2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3904
-