Analysis
-
max time kernel
52s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
06-08-2022 07:56
Static task
static1
Behavioral task
behavioral1
Sample
a661148c26dc8bd4992bbd23b350f062.exe
Resource
win7-20220715-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
a661148c26dc8bd4992bbd23b350f062.exe
Resource
win10v2004-20220722-en
8 signatures
150 seconds
General
-
Target
a661148c26dc8bd4992bbd23b350f062.exe
-
Size
928KB
-
MD5
a661148c26dc8bd4992bbd23b350f062
-
SHA1
35af577d4c5c0d94585fc41b2f1834f463727c20
-
SHA256
0e184b1b8ebe69d4e06a8a71c53054b3713ec9f2a0a9f8988ce235d130ac549c
-
SHA512
adb8d4c0a859acbb8c5cd7114d9a1f9233dce045be42e3224f62a08b4e000513788263a9ccd6c27919a0449437d843072f2c8d81e876ecc2220b695b5eebfafe
Score
10/10
Malware Config
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2032 set thread context of 1768 2032 a661148c26dc8bd4992bbd23b350f062.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1720 powershell.exe 2032 a661148c26dc8bd4992bbd23b350f062.exe 2032 a661148c26dc8bd4992bbd23b350f062.exe 2032 a661148c26dc8bd4992bbd23b350f062.exe 2032 a661148c26dc8bd4992bbd23b350f062.exe 2032 a661148c26dc8bd4992bbd23b350f062.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2032 a661148c26dc8bd4992bbd23b350f062.exe Token: SeDebugPrivilege 1720 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1768 InstallUtil.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2032 wrote to memory of 1720 2032 a661148c26dc8bd4992bbd23b350f062.exe 27 PID 2032 wrote to memory of 1720 2032 a661148c26dc8bd4992bbd23b350f062.exe 27 PID 2032 wrote to memory of 1720 2032 a661148c26dc8bd4992bbd23b350f062.exe 27 PID 2032 wrote to memory of 1720 2032 a661148c26dc8bd4992bbd23b350f062.exe 27 PID 2032 wrote to memory of 900 2032 a661148c26dc8bd4992bbd23b350f062.exe 29 PID 2032 wrote to memory of 900 2032 a661148c26dc8bd4992bbd23b350f062.exe 29 PID 2032 wrote to memory of 900 2032 a661148c26dc8bd4992bbd23b350f062.exe 29 PID 2032 wrote to memory of 900 2032 a661148c26dc8bd4992bbd23b350f062.exe 29 PID 2032 wrote to memory of 900 2032 a661148c26dc8bd4992bbd23b350f062.exe 29 PID 2032 wrote to memory of 900 2032 a661148c26dc8bd4992bbd23b350f062.exe 29 PID 2032 wrote to memory of 900 2032 a661148c26dc8bd4992bbd23b350f062.exe 29 PID 2032 wrote to memory of 564 2032 a661148c26dc8bd4992bbd23b350f062.exe 30 PID 2032 wrote to memory of 564 2032 a661148c26dc8bd4992bbd23b350f062.exe 30 PID 2032 wrote to memory of 564 2032 a661148c26dc8bd4992bbd23b350f062.exe 30 PID 2032 wrote to memory of 564 2032 a661148c26dc8bd4992bbd23b350f062.exe 30 PID 2032 wrote to memory of 564 2032 a661148c26dc8bd4992bbd23b350f062.exe 30 PID 2032 wrote to memory of 564 2032 a661148c26dc8bd4992bbd23b350f062.exe 30 PID 2032 wrote to memory of 564 2032 a661148c26dc8bd4992bbd23b350f062.exe 30 PID 2032 wrote to memory of 1768 2032 a661148c26dc8bd4992bbd23b350f062.exe 31 PID 2032 wrote to memory of 1768 2032 a661148c26dc8bd4992bbd23b350f062.exe 31 PID 2032 wrote to memory of 1768 2032 a661148c26dc8bd4992bbd23b350f062.exe 31 PID 2032 wrote to memory of 1768 2032 a661148c26dc8bd4992bbd23b350f062.exe 31 PID 2032 wrote to memory of 1768 2032 a661148c26dc8bd4992bbd23b350f062.exe 31 PID 2032 wrote to memory of 1768 2032 a661148c26dc8bd4992bbd23b350f062.exe 31 PID 2032 wrote to memory of 1768 2032 a661148c26dc8bd4992bbd23b350f062.exe 31 PID 2032 wrote to memory of 1768 2032 a661148c26dc8bd4992bbd23b350f062.exe 31 PID 2032 wrote to memory of 1768 2032 a661148c26dc8bd4992bbd23b350f062.exe 31 PID 2032 wrote to memory of 1768 2032 a661148c26dc8bd4992bbd23b350f062.exe 31 PID 2032 wrote to memory of 1768 2032 a661148c26dc8bd4992bbd23b350f062.exe 31 PID 2032 wrote to memory of 1768 2032 a661148c26dc8bd4992bbd23b350f062.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\a661148c26dc8bd4992bbd23b350f062.exe"C:\Users\Admin\AppData\Local\Temp\a661148c26dc8bd4992bbd23b350f062.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANQA=2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1720
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵PID:900
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵PID:564
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵
- Suspicious use of SetWindowsHookEx
PID:1768
-