Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
28/07/2022, 16:02
Static task
static1
Behavioral task
behavioral1
Sample
Docu086.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
Docu086.exe
Resource
win10v2004-20220721-en
General
-
Target
Docu086.exe
-
Size
832KB
-
MD5
b93e02f5cd2641229c13cffac01315a8
-
SHA1
0e98a61337f207d1c97aa8eae179dc528d1a75f5
-
SHA256
42f31614f84336fe90a93d59c656e7c564f07497957e2876d5ea0ddb22a96d25
-
SHA512
55de646be0b5fa8651be05a525091a29f657ad8560b5e1dbbeed0570b5b3f4da8acaabf78e29cfb05162bae758f4de6d84c804e54376a0be01ffe4d33dff4a56
Malware Config
Extracted
blustealer
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
6%s@300%27118
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\Control Panel\International\Geo\Nation Docu086.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4780 set thread context of 3892 4780 Docu086.exe 91 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1976 powershell.exe 1976 powershell.exe 4780 Docu086.exe 4780 Docu086.exe 4780 Docu086.exe 4780 Docu086.exe 4780 Docu086.exe 4780 Docu086.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1976 powershell.exe Token: SeDebugPrivilege 4780 Docu086.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3892 InstallUtil.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4780 wrote to memory of 1976 4780 Docu086.exe 84 PID 4780 wrote to memory of 1976 4780 Docu086.exe 84 PID 4780 wrote to memory of 1976 4780 Docu086.exe 84 PID 4780 wrote to memory of 1336 4780 Docu086.exe 90 PID 4780 wrote to memory of 1336 4780 Docu086.exe 90 PID 4780 wrote to memory of 1336 4780 Docu086.exe 90 PID 4780 wrote to memory of 3892 4780 Docu086.exe 91 PID 4780 wrote to memory of 3892 4780 Docu086.exe 91 PID 4780 wrote to memory of 3892 4780 Docu086.exe 91 PID 4780 wrote to memory of 3892 4780 Docu086.exe 91 PID 4780 wrote to memory of 3892 4780 Docu086.exe 91 PID 4780 wrote to memory of 3892 4780 Docu086.exe 91 PID 4780 wrote to memory of 3892 4780 Docu086.exe 91 PID 4780 wrote to memory of 3892 4780 Docu086.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\Docu086.exe"C:\Users\Admin\AppData\Local\Temp\Docu086.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1976
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵PID:1336
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵
- Suspicious use of SetWindowsHookEx
PID:3892
-