Analysis
-
max time kernel
918s -
max time network
919s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-12-2024 20:07
Static task
static1
Behavioral task
behavioral1
Sample
BRUTOFORCE SEED V12.7.8.exe
Resource
win10v2004-20241007-en
General
-
Target
BRUTOFORCE SEED V12.7.8.exe
-
Size
40.2MB
-
MD5
52abb3e74164e2ad5878096bb6a3625e
-
SHA1
6f2b960b05a788e7177320b16370613baac2a5e6
-
SHA256
4430db9f5ed3a2cc612fcd4784f0774d0fc5d505ee5c1aa25234e1d27e85a3a8
-
SHA512
a6b832560972ffe69c7a29b87dda53fe6dcf5f990724f2149df96c3ad233cf575658b59011ece904f2af3d138fe87d12703233636003fcd8cb46444398b5528f
-
SSDEEP
786432:0cmyjMgsUCYEUhp9+baSgeB/WdLH8J+hvAdanW0u2AyM1:0RqMQCuz9W/2cYYdanW31
Malware Config
Signatures
-
BlackGuard
Infostealer first seen in Late 2021.
-
Blackguard family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation BRUTOFORCE SEED V12.7.8.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation BRUTOFORCE SEED V12.6.1.EXE -
Executes dropped EXE 3 IoCs
pid Process 4932 BRUTOFORCE SEED V12.6.1.EXE 4016 BRUTOFORCE SEED V12.6.1.EXE 3212 SHARPIL.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 46 api.ipify.org 47 api.ipify.org 48 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BRUTOFORCE SEED V12.6.1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BRUTOFORCE SEED V12.6.1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SHARPIL.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 SHARPIL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier SHARPIL.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3212 SHARPIL.exe 3212 SHARPIL.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3212 SHARPIL.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4912 wrote to memory of 4932 4912 BRUTOFORCE SEED V12.7.8.exe 83 PID 4912 wrote to memory of 4932 4912 BRUTOFORCE SEED V12.7.8.exe 83 PID 4912 wrote to memory of 4932 4912 BRUTOFORCE SEED V12.7.8.exe 83 PID 4932 wrote to memory of 4016 4932 BRUTOFORCE SEED V12.6.1.EXE 111 PID 4932 wrote to memory of 4016 4932 BRUTOFORCE SEED V12.6.1.EXE 111 PID 4932 wrote to memory of 4016 4932 BRUTOFORCE SEED V12.6.1.EXE 111 PID 4912 wrote to memory of 3212 4912 BRUTOFORCE SEED V12.7.8.exe 112 PID 4912 wrote to memory of 3212 4912 BRUTOFORCE SEED V12.7.8.exe 112 PID 4912 wrote to memory of 3212 4912 BRUTOFORCE SEED V12.7.8.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\BRUTOFORCE SEED V12.7.8.exe"C:\Users\Admin\AppData\Local\Temp\BRUTOFORCE SEED V12.7.8.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\BRUTOFORCE SEED V12.6.1.EXE"C:\Users\Admin\AppData\Local\Temp\RarSFX0\BRUTOFORCE SEED V12.6.1.EXE"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\BRUTOFORCE SEED V12.6.1.EXE"C:\Users\Admin\AppData\Local\Temp\RarSFX0\BRUTOFORCE SEED V12.6.1.EXE"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4016
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\SHARPIL.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\SHARPIL.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3212
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105B
MD52e9d094dda5cdc3ce6519f75943a4ff4
SHA15d989b4ac8b699781681fe75ed9ef98191a5096c
SHA256c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142
SHA512d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7
-
Filesize
1KB
MD585a28683aa1ab123853f2530055e4419
SHA17a4810aba698dbe3464d644be1fcd41c4eba20c4
SHA256e6c12b54b25f9c897ba8148d32fe40d1bf4482dba6ca51f9b978cdd43b9720c2
SHA512cced83afcba8afd0b95b4179e0c5e76fb438912a82cc00f741d2540ed3b776773b11eaa1d2d86339b105cf4c9a7a3f36ed0bc77001f5df11931a5baf0b36a612
-
Filesize
1KB
MD5e6683de66d8d2773b08b0683035f5acd
SHA18dbfedd072dc5d0bdaefe9a0ed2d345787d31a05
SHA2563672a5b256454d65f4c059cada9a3db716c4a1153118b972a28c39ea3eec3017
SHA512d0023d3018a177fe1a9d13cd0ae4573c2706329413940638663142bfdf7b293bddbd040426762fa98572dde7e257bd6082c9e0779ec217bdda4f7c23cc7d41a1
-
Filesize
41B
MD56ab6927ce351b853fe0538033e9262c3
SHA12440c774afb6b49a2d5e2ba3001aa5c131824e5c
SHA25608d91a6aa426886887112642fdd0f6f2e5c37a317c6fd3bba2e2305975f3110e
SHA512ae7156df7ec8d63e5a097796052ce65b0db15744439839b1d223098704aa0190fa42159fc757491433334bc0a587da739623dc3b079ce09600087a8f55d0c85d
-
Filesize
291KB
MD5fd8dbbff11893d8010cea56e7a8d5370
SHA1b476bf5ac599b956beeb705c24fbb1a524ba4d7f
SHA25672d4546c8928cf3e62f19543654da10b704cb1588458f0cc90ec0aaf62dc5d5c
SHA51260742cecc99e9b2911dfa8a8b822cfaefa5ad109c87a026cf7f67c1e5ada78b12e81c76b29ea7bf171f622ef3012c1737f78fca68d4b850073b4a9fcbcd3b458
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
Filesize
124KB
MD59618e15b04a4ddb39ed6c496575f6f95
SHA11c28f8750e5555776b3c80b187c5d15a443a7412
SHA256a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab
SHA512f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26