Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
646s -
max time network
650s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
03/08/2022, 13:55
Static task
static1
Behavioral task
behavioral1
Sample
doc2022001001001.pdf.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
doc2022001001001.pdf.exe
Resource
win10v2004-20220722-en
General
-
Target
doc2022001001001.pdf.exe
-
Size
1.2MB
-
MD5
39b7ffa8957fe5a6ca72cca183a67d42
-
SHA1
41b478d0dbf80cf8a6fffc1b14230c193ae124e5
-
SHA256
3879b7d1e92d9b91e94c83e35421b6b64c1e529e28335962c1da8626b0a29d83
-
SHA512
43ebc7daf28ebf5ebc8016533e26b13d1e185610690badcf613af20f6e3ff66d7c0adc71dec714c50c06359182f421f3cf05983af2252c5fdd8375c1fa2631e2
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5420760971:AAH01qjNE4a_MymOsvjAcXOxeYA3Wd9XCkE/sendMessage?chat_id=1856108848
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1896 set thread context of 1068 1896 doc2022001001001.pdf.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1728 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1896 doc2022001001001.pdf.exe 1896 doc2022001001001.pdf.exe 1896 doc2022001001001.pdf.exe 1724 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1896 doc2022001001001.pdf.exe Token: SeDebugPrivilege 1724 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1068 doc2022001001001.pdf.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1896 wrote to memory of 1724 1896 doc2022001001001.pdf.exe 27 PID 1896 wrote to memory of 1724 1896 doc2022001001001.pdf.exe 27 PID 1896 wrote to memory of 1724 1896 doc2022001001001.pdf.exe 27 PID 1896 wrote to memory of 1724 1896 doc2022001001001.pdf.exe 27 PID 1896 wrote to memory of 1728 1896 doc2022001001001.pdf.exe 29 PID 1896 wrote to memory of 1728 1896 doc2022001001001.pdf.exe 29 PID 1896 wrote to memory of 1728 1896 doc2022001001001.pdf.exe 29 PID 1896 wrote to memory of 1728 1896 doc2022001001001.pdf.exe 29 PID 1896 wrote to memory of 1068 1896 doc2022001001001.pdf.exe 31 PID 1896 wrote to memory of 1068 1896 doc2022001001001.pdf.exe 31 PID 1896 wrote to memory of 1068 1896 doc2022001001001.pdf.exe 31 PID 1896 wrote to memory of 1068 1896 doc2022001001001.pdf.exe 31 PID 1896 wrote to memory of 1068 1896 doc2022001001001.pdf.exe 31 PID 1896 wrote to memory of 1068 1896 doc2022001001001.pdf.exe 31 PID 1896 wrote to memory of 1068 1896 doc2022001001001.pdf.exe 31 PID 1896 wrote to memory of 1068 1896 doc2022001001001.pdf.exe 31 PID 1896 wrote to memory of 1068 1896 doc2022001001001.pdf.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\doc2022001001001.pdf.exe"C:\Users\Admin\AppData\Local\Temp\doc2022001001001.pdf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\svsbbPBTQBkgEG.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1724
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\svsbbPBTQBkgEG" /XML "C:\Users\Admin\AppData\Local\Temp\tmpDF77.tmp"2⤵
- Creates scheduled task(s)
PID:1728
-
-
C:\Users\Admin\AppData\Local\Temp\doc2022001001001.pdf.exe"C:\Users\Admin\AppData\Local\Temp\doc2022001001001.pdf.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:1068
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD52f5361ed93bdf6de5638b31b27c2043c
SHA184d52d2caf8d7bb7e205ab8a5a9e660218384d21
SHA25648447f1bcc20e4406210319222ab9ed0b5006d5ff57982bfcf99d9e73891bc67
SHA512f46ceae38c9f8e03a651c5b275fb6aa7f6ac15f72411e56091a9794d10035efa23c22c2f5e2fbf72e4fff742895832b4f897bb9189e0e3557595cf49085fbdbc