Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
39s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
28/07/2022, 16:02
Static task
static1
Behavioral task
behavioral1
Sample
Docu086.exe
Resource
win7-20220715-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
Docu086.exe
Resource
win10v2004-20220721-en
8 signatures
150 seconds
General
-
Target
Docu086.exe
-
Size
832KB
-
MD5
b93e02f5cd2641229c13cffac01315a8
-
SHA1
0e98a61337f207d1c97aa8eae179dc528d1a75f5
-
SHA256
42f31614f84336fe90a93d59c656e7c564f07497957e2876d5ea0ddb22a96d25
-
SHA512
55de646be0b5fa8651be05a525091a29f657ad8560b5e1dbbeed0570b5b3f4da8acaabf78e29cfb05162bae758f4de6d84c804e54376a0be01ffe4d33dff4a56
Score
10/10
Malware Config
Extracted
Family
blustealer
Credentials
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
6%s@300%27118
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1564 set thread context of 1396 1564 Docu086.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 908 powershell.exe 1564 Docu086.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 908 powershell.exe Token: SeDebugPrivilege 1564 Docu086.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1396 InstallUtil.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1564 wrote to memory of 908 1564 Docu086.exe 27 PID 1564 wrote to memory of 908 1564 Docu086.exe 27 PID 1564 wrote to memory of 908 1564 Docu086.exe 27 PID 1564 wrote to memory of 908 1564 Docu086.exe 27 PID 1564 wrote to memory of 1396 1564 Docu086.exe 29 PID 1564 wrote to memory of 1396 1564 Docu086.exe 29 PID 1564 wrote to memory of 1396 1564 Docu086.exe 29 PID 1564 wrote to memory of 1396 1564 Docu086.exe 29 PID 1564 wrote to memory of 1396 1564 Docu086.exe 29 PID 1564 wrote to memory of 1396 1564 Docu086.exe 29 PID 1564 wrote to memory of 1396 1564 Docu086.exe 29 PID 1564 wrote to memory of 1396 1564 Docu086.exe 29 PID 1564 wrote to memory of 1396 1564 Docu086.exe 29 PID 1564 wrote to memory of 1396 1564 Docu086.exe 29 PID 1564 wrote to memory of 1396 1564 Docu086.exe 29 PID 1564 wrote to memory of 1396 1564 Docu086.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\Docu086.exe"C:\Users\Admin\AppData\Local\Temp\Docu086.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:908
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵
- Suspicious use of SetWindowsHookEx
PID:1396
-