Analysis

  • max time kernel
    58s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220715-en
  • resource tags

    arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system
  • submitted
    02/08/2022, 07:48 UTC

General

  • Target

    Doc0627.exe

  • Size

    866KB

  • MD5

    1db4863326d564281893628c4ecbe87b

  • SHA1

    55dae7e5b29e7e8c8aaeeb748807408d7f8bc3f4

  • SHA256

    81cdbea7a809be0f353a0d72397fb91821650770e736f9bd68f4501be64572d3

  • SHA512

    9c4c82e67dcedd4d27c7bd1230700c310eb111cf4a73a19e0de301f82f779851a3be991a9b90c96128c764c84595a1f4d049b4c99b0ba326737ff7e44ddd0feb

Score
10/10

Malware Config

Signatures

  • BluStealer

    A Modular information stealer written in Visual Basic.

  • Uses the VBS compiler for execution 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Doc0627.exe
    "C:\Users\Admin\AppData\Local\Temp\Doc0627.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1056
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
      2⤵
        PID:2028

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1056-54-0x00000000002B0000-0x000000000038E000-memory.dmp

      Filesize

      888KB

    • memory/1056-55-0x0000000074E11000-0x0000000074E13000-memory.dmp

      Filesize

      8KB

    • memory/2028-56-0x0000000000270000-0x000000000030E000-memory.dmp

      Filesize

      632KB

    • memory/2028-57-0x0000000000270000-0x000000000030E000-memory.dmp

      Filesize

      632KB

    • memory/2028-59-0x0000000000270000-0x000000000030E000-memory.dmp

      Filesize

      632KB

    • memory/2028-61-0x0000000000400000-0x000000000049E000-memory.dmp

      Filesize

      632KB

    • memory/2028-63-0x0000000000270000-0x000000000030E000-memory.dmp

      Filesize

      632KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.