Analysis
-
max time kernel
72s -
platform
windows11-21h2_x64 -
resource
win11-20250207-en -
resource tags
arch:x64arch:x86image:win11-20250207-enlocale:en-usos:windows11-21h2-x64system -
submitted
07-02-2025 22:12
Behavioral task
behavioral1
Sample
dsa.7z
Resource
win11-20250207-en
General
-
Target
dsa.7z
-
Size
31.6MB
-
MD5
29df20c3ab674d32dbff4ad9d2cae227
-
SHA1
53b1252248cf35260f31243e7167486a6ceb508f
-
SHA256
dfea5761c13795a4eac03f0e150f92eae0c7fd2b1be234bc53cf3726f8aacdbd
-
SHA512
da31410916079c47fdc55cf66e7a98240a85fc785ece94c252c81a11814756af7ca1b8900065d62559a912ddb554a76e79447ca7ffdf6ac6ddc54a694c3f35e1
-
SSDEEP
786432:p+lahZxH62fanCSUpfUfp+iZPcdDfK3BpEJz/RbRMzDIfka:prJinCdU8iZkdDBRbGIl
Malware Config
Signatures
-
BlackGuard
Infostealer first seen in Late 2021.
-
Blackguard family
-
Executes dropped EXE 1 IoCs
pid Process 4736 Builder.exe -
Loads dropped DLL 4 IoCs
pid Process 4736 Builder.exe 4736 Builder.exe 4736 Builder.exe 4736 Builder.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Builder.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1528 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4704 7zFM.exe 1528 vlc.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeRestorePrivilege 4704 7zFM.exe Token: 35 4704 7zFM.exe Token: SeSecurityPrivilege 4704 7zFM.exe Token: 33 412 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 412 AUDIODG.EXE Token: 33 1528 vlc.exe Token: SeIncBasePriorityPrivilege 1528 vlc.exe -
Suspicious use of FindShellTrayWindow 47 IoCs
pid Process 4704 7zFM.exe 4704 7zFM.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe -
Suspicious use of SendNotifyMessage 9 IoCs
pid Process 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\dsa.7z"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4704
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2036
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\BlackGuard Stealer Builder\bandicam 2022-05-12 17-09-20-649.mp4"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1528
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004E8 0x00000000000004F01⤵
- Suspicious use of AdjustPrivilegeToken
PID:412
-
C:\Users\Admin\Desktop\BlackGuard Stealer Builder\Builder\Builder.exe"C:\Users\Admin\Desktop\BlackGuard Stealer Builder\Builder\Builder.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4736
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\7zE06238D87\BlackGuard Stealer Builder\Panel\www\img\famfamfam-countryflags\re.gif
Filesize366B
MD50a4673b07b377d1f58230f40f256d890
SHA17e36554ade83e484899a73946ce5e59a4b9fb6e6
SHA256e2016ab933817845c6bca46de5c80793c2e3baa94fdd467589a0ca47ebdb9676
SHA5121724e9e368bf09377878b4674cddf56e1cb7d31a6e86d8be747480365d6bd10b0ff118e6a525090f196c1113c4344792725b79f6ba3dcc10e66a84fbf726da1f
-
C:\Users\Admin\AppData\Local\Temp\7zE06238D87\BlackGuard Stealer Builder\Panel\www\img\famfamfam-countryflags\sj.gif
Filesize376B
MD5bbc9011e876a122ea89923e6b730ec50
SHA17398e4ba0fd8d122eaa2e4c807345f611d6a7594
SHA256019bdfaed643674542f71514948050b099901534673a2b5d80a472f1f1a88dfd
SHA512141810a6dcc436864b41667064f06dc188e6847fe745f85a65003430ec2608490a43fb6f6adca68994c21da90ffef2d08c0890d4f2b3b527246c6270559563d2
-
C:\Users\Admin\AppData\Local\Temp\7zE06238D87\BlackGuard Stealer Builder\Panel\www\panel\font-awesome.css
Filesize36KB
MD5c495654869785bc3df60216616814ad1
SHA10140952c64e3f2b74ef64e050f2fe86eab6624c8
SHA25636e0a7e08bee65774168528938072c536437669c1b7458ac77976ec788e4439c
SHA512e40f27c1d30e5ab4b3db47c3b2373381489d50147c9623d853e5b299364fd65998f46e8e73b1e566fd79e97aa7b20354cd3c8c79f15372c147fed9c913ffb106
-
C:\Users\Admin\AppData\Local\Temp\7zE06238D87\BlackGuard Stealer Builder\Panel\www\panel\img\famfamfam-countryflags\au.gif
Filesize378B
MD51fe85ab1104e05f5a26efa5bbcd1cf18
SHA13dc73195ca141c933931a6447468dd1b6fb73301
SHA2566a86e7a3e4bda011deb945b4168e01c5435efcb9cc41c00efbd5fe464dbb65db
SHA512e9a86a9d745fbf255360af58785166174ceb54b7f9d91ba4d9085c7f7d3173723d0b8846146a85668bc88c36f82a3d1ee0ab1c067bcad4cb9bccb8a46306861d
-
Filesize
634KB
MD54a647d989a49725ff6617de8357be484
SHA12e8f72c54edfd71ca7e3c7fad545ae73a305ca7e
SHA2569c86108e34a3d07890551e35bf497da052ce21cab0ba4ec10ccd439001b5892b
SHA51229f2813ec799d66c4c702b656fd621be0d1a8389d8fb2ae7f3fcbb3dc5e7d1619b75bc92f369200e02a95c02da22223cbf0e520796bd5b5cbd2689e5d382d395
-
Filesize
580KB
MD5513e7845d06db10b2d639370d94767ec
SHA1967df05e9d8bf431962fb28a771667462211672a
SHA256d67906f22f3ab191f9774a48977c9a765582c948a37c595bd299db3c8f465f13
SHA512698eb74eab94485371cff4ecb4f31c42ec27490aba25513b85b9d509313617936efaf170e93d40ec40a550076f43340955289bfbd40decc765d5891bb2cd97cc
-
Filesize
9.7MB
MD511ee415ffe942a18f5429802a56b5a08
SHA11536b8d10f827c2a483d9b4c7423b3ae9b35772a
SHA2568556a420ce8441261c575e1f030ad2d90a69d08bae576f7db921dd727925a291
SHA5120c984827933e8e6fcc2ac4f64bef598cab884c9cbb8da4376e9beb9c030dc57c54e72f25a6ec25acbb07472f19fe4639ceefa20627775ad828b23740411737b7
-
Filesize
1.1MB
MD5de0069c4097c987bd30ebe8155a8af35
SHA1aced007f4d852d7b84c689a92d9c36e24381d375
SHA25683445595d38a8e33513b33dfc201983af4746e5327c9bed470a6282d91d539b6
SHA51266c45818e5c555e5250f8250ea704bc4ca32ddb4d5824c852ae5dc0f264b009af73c7c1e0db1b74c14ee6b612608d939386da23b56520cac415cd5a8f60a5502
-
Filesize
43.0MB
MD5b00d387b39cf7ac870e38db2e3e8f378
SHA162daf2dbdd2235c8018046f493fbc09476338fb1
SHA256ea711ccefa4b4167e8260688ee347810787608e868bb2da7c2bb9b36398b390b
SHA512e556ff9cce0ca366ce6fb4ec60e26170e8556964a715646d019332496959bc0997b6fcf35597b5cd3cb5e59ef7fc31cde594cddf44c26c7d73ff542c95a57411