Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
203s -
max time network
211s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2023, 02:08
Static task
static1
Behavioral task
behavioral1
Sample
90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe
Resource
win10v2004-20230220-en
General
-
Target
90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe
-
Size
1.5MB
-
MD5
e2b30c0c90faeeb878ed21be152d2dc1
-
SHA1
b64e8bbd7d23f9585a7ff9b24a61a7ab119f1769
-
SHA256
90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f
-
SHA512
7126633aeaeaa91f08d5c0dce6129bfb7501287cad6ac106f1c64c2ab0cb010d3b870680047ea3e9dffdb3bfccab2a9d2a11f8057dd302dfaf140b34022bd74f
-
SSDEEP
24576:PnQ3GQdfKrh2G8uraReOgX1yFQ+5irxTCQJ5xvCwUXZMnKfJIxzN5b2K:P9QdIuWed+sKK+CQ5CwMZMnx0
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Executes dropped EXE 6 IoCs
pid Process 2952 alg.exe 2616 DiagnosticsHub.StandardCollector.Service.exe 4944 fxssvc.exe 664 elevation_service.exe 4940 elevation_service.exe 2800 maintenanceservice.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe File opened for modification C:\Windows\system32\fxssvc.exe 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe File opened for modification C:\Windows\System32\msdtc.exe 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe File opened for modification C:\Windows\System32\alg.exe 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe File opened for modification C:\Windows\system32\AppVClient.exe 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\916dddb850d0d086.bin alg.exe File opened for modification C:\Windows\system32\dllhost.exe 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1216 set thread context of 3640 1216 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 87 PID 3640 set thread context of 2992 3640 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 92 -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@fxsresm.dll,-1132 = "Store in a folder" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@fxsresm.dll,-1131 = "Route through e-mail" fxssvc.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 78 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1216 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 1216 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 656 Process not Found 656 Process not Found -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1216 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe Token: SeTakeOwnershipPrivilege 3640 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe Token: SeAuditPrivilege 4944 fxssvc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3640 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1216 wrote to memory of 1156 1216 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 86 PID 1216 wrote to memory of 1156 1216 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 86 PID 1216 wrote to memory of 1156 1216 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 86 PID 1216 wrote to memory of 3640 1216 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 87 PID 1216 wrote to memory of 3640 1216 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 87 PID 1216 wrote to memory of 3640 1216 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 87 PID 1216 wrote to memory of 3640 1216 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 87 PID 1216 wrote to memory of 3640 1216 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 87 PID 1216 wrote to memory of 3640 1216 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 87 PID 1216 wrote to memory of 3640 1216 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 87 PID 1216 wrote to memory of 3640 1216 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 87 PID 3640 wrote to memory of 2992 3640 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 92 PID 3640 wrote to memory of 2992 3640 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 92 PID 3640 wrote to memory of 2992 3640 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 92 PID 3640 wrote to memory of 2992 3640 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 92 PID 3640 wrote to memory of 2992 3640 90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe 92 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe"C:\Users\Admin\AppData\Local\Temp\90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe"C:\Users\Admin\AppData\Local\Temp\90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe"2⤵PID:1156
-
-
C:\Users\Admin\AppData\Local\Temp\90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe"C:\Users\Admin\AppData\Local\Temp\90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f.exe"2⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe3⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:2992
-
-
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2952
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
PID:2616
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:1604
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4944
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
- Executes dropped EXE
PID:664
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:4940
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:2800
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD50da9d2bac2dcd332aef6f2954f5f81e8
SHA1d653450f28a4adf253c2a87eb2a0eb626719f7a2
SHA256f1027f7043bcb0af319a7e9a66de23d38db3244aacf87e33511c72a7fa20f6ef
SHA5129f8747bed40118018a3a1ed63ca72e1f556d69453f52ba78f988e77ae60d35ffb778feb2b2c382320a875f50c8d62a186cb6b71c7be59635feff963e7df03a20
-
Filesize
1.4MB
MD5f844d597da3ea55ef83be7d0458baa6a
SHA1e2845e82e0974158eb01824e12350151b0b53411
SHA25693e8712af0e8b3f9b6e61f289c373562ea894884034ba6f8f42d49eef9a10c52
SHA512a49f0efeef3730e624139b835fd4b818cd74c33ede65d700edb5d5b6fde74bfe8b7f2217231ffd00e21141b440de5b49a8b3c1811bee0b17df4b35279e0e6abc
-
Filesize
2.1MB
MD5fa0d98a41f4aa0a463f1fce155e64eb4
SHA1e567e910c7f61fc28c96b41d8a48a19f6b59bc72
SHA256cb42cc1ff1183b70803d02d4f4665b9afb274b8e4591f57ef41f0ecf2a70c1a2
SHA5127825073ea97df83cd5823303f0a2ffd50c29d13a460af8e2d6adeb4285f0b439133062a6f0cdb2f9429cd18e52ceaa9637bd9d9bde39f8fe4d494b90d153f1f7
-
Filesize
1.3MB
MD546e7f6acb0ef8a6f48754703b574b66f
SHA18d43fad37fb2580ee7feeece03d32b72065e15c1
SHA2567995e0be800144323d08bb196491fd581005acccbde4bc511e5afcad49d6c947
SHA512850b501ff632fb8157304a5d9d559543d519c22eda23b69ff274732c483ac951600b27d33508bccdcad75a754174baa456ce9e2ac9d6fc5d38c7ecaa507709e7
-
Filesize
1.2MB
MD5e3f85ffec7faabc6028bfca0a578bbce
SHA1cb0baf27629708a1a9a2712943bf2025ce16de28
SHA2566b8335e7463d8a954c66b814e46ad65a9151c62070534d10f057b6183c47c492
SHA512200b0507b9afbd8c9193f6dac999085c4e0a35e2c9292f7240ec97ac84e2ee432f9cb67424d12ebb437e6b45ae7d1d344c53772adc968bb0715621aafb40db46
-
Filesize
1.3MB
MD54a831043175b09fac62deea276c2946a
SHA1b1a22f62db47213e29cc919175820031b34cd2e4
SHA2568c7a40ad556905bc8a83cec45c73edca5e54a8cc8a1dbb62a1da232b0c00ea1b
SHA512792acec4333a193b022e2944a21376ff564028039dc3d1b001344cc31a8ce892b26cf8cf92f1fc3c63b6b3e76236c95b945d1550d1bbc097f5b2560a43f91bc0