Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    127s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230621-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/06/2023, 12:00

General

  • Target

    bluesubstantialie64/bluesubstantialie64.exe

  • Size

    13.2MB

  • MD5

    2bd2470d90bd8de8e260ff88a3fb181b

  • SHA1

    9fa0ac71fc0a7d36ad1c2b402f434f96f0453690

  • SHA256

    65918b1b4aaa0f8311e8ce96fffa7f7993537bf6132ef197ec3bb4717901198a

  • SHA512

    eeea312300337fb56c75bc3888c1233820e8c7a504f76384e833430feb355ab28fc437978c8a20561da4ffbae24c1596d24e137e49ec323045cc188607454b0b

  • SSDEEP

    393216:Rxry/zJfUYeJIEfvx4qqWwoD/E+Bp0tQ:Rxur14JIEBJq/wh7b

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bluesubstantialie64\bluesubstantialie64.exe
    "C:\Users\Admin\AppData\Local\Temp\bluesubstantialie64\bluesubstantialie64.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1288
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bluesubstantial.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bluesubstantial.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:4804
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4804 -s 1624
        3⤵
        • Program crash
        PID:864
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bluesubstantial0.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bluesubstantial0.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:836
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4804 -ip 4804
    1⤵
      PID:1092

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bluesubstantial.exe

      Filesize

      6.0MB

      MD5

      a97d2a887eb6d38fce468d7f2cffbfdd

      SHA1

      85dde9df56fef010287124882f6f36d5a6d74bfc

      SHA256

      0995e5bcab63116a29fdd780273af52de99af8539d859ace9cb301f6deff5d59

      SHA512

      32867c0137fa4fb55f8d6b1102375fb2aef45d7b015a571e3e2baeebdfcc4dd5bbc9908fef175b4d6b8ee548887c9920b3dd22372550a8fcd6848b6995c46b81

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bluesubstantial.exe

      Filesize

      6.0MB

      MD5

      a97d2a887eb6d38fce468d7f2cffbfdd

      SHA1

      85dde9df56fef010287124882f6f36d5a6d74bfc

      SHA256

      0995e5bcab63116a29fdd780273af52de99af8539d859ace9cb301f6deff5d59

      SHA512

      32867c0137fa4fb55f8d6b1102375fb2aef45d7b015a571e3e2baeebdfcc4dd5bbc9908fef175b4d6b8ee548887c9920b3dd22372550a8fcd6848b6995c46b81

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bluesubstantial0.exe

      Filesize

      7.0MB

      MD5

      f75c56db14c39c608dd83af6deec4454

      SHA1

      5da4b32ab3ec9a1e33aba38ea7577c439c64c532

      SHA256

      c6dfb0fd354958a3a5d2590f2e2f9e2701bb951eb87487b74a5ea04cfa7165da

      SHA512

      d3bf5d9ddc905e3946138aa4696a25f490910f2c3b849597fc94f751d5492a6a597b95c6da5f47777b11d98ed1b6a792345a9a00dc056d70e15ee4c8b4848e80

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bluesubstantial0.exe

      Filesize

      7.0MB

      MD5

      f75c56db14c39c608dd83af6deec4454

      SHA1

      5da4b32ab3ec9a1e33aba38ea7577c439c64c532

      SHA256

      c6dfb0fd354958a3a5d2590f2e2f9e2701bb951eb87487b74a5ea04cfa7165da

      SHA512

      d3bf5d9ddc905e3946138aa4696a25f490910f2c3b849597fc94f751d5492a6a597b95c6da5f47777b11d98ed1b6a792345a9a00dc056d70e15ee4c8b4848e80

    • memory/836-173-0x00000247EE240000-0x00000247EE3B7000-memory.dmp

      Filesize

      1.5MB

    • memory/836-165-0x00000247EE240000-0x00000247EE3B7000-memory.dmp

      Filesize

      1.5MB

    • memory/836-1071-0x00000247EC110000-0x00000247EC111000-memory.dmp

      Filesize

      4KB

    • memory/836-146-0x00000247EB500000-0x00000247EBC0E000-memory.dmp

      Filesize

      7.1MB

    • memory/836-147-0x00000247EDA20000-0x00000247EDA30000-memory.dmp

      Filesize

      64KB

    • memory/836-148-0x00000247EE240000-0x00000247EE3B7000-memory.dmp

      Filesize

      1.5MB

    • memory/836-149-0x00000247EE240000-0x00000247EE3B7000-memory.dmp

      Filesize

      1.5MB

    • memory/836-151-0x00000247EE240000-0x00000247EE3B7000-memory.dmp

      Filesize

      1.5MB

    • memory/836-153-0x00000247EE240000-0x00000247EE3B7000-memory.dmp

      Filesize

      1.5MB

    • memory/836-155-0x00000247EE240000-0x00000247EE3B7000-memory.dmp

      Filesize

      1.5MB

    • memory/836-157-0x00000247EE240000-0x00000247EE3B7000-memory.dmp

      Filesize

      1.5MB

    • memory/836-159-0x00000247EE240000-0x00000247EE3B7000-memory.dmp

      Filesize

      1.5MB

    • memory/836-161-0x00000247EE240000-0x00000247EE3B7000-memory.dmp

      Filesize

      1.5MB

    • memory/836-163-0x00000247EE240000-0x00000247EE3B7000-memory.dmp

      Filesize

      1.5MB

    • memory/836-175-0x00000247EE240000-0x00000247EE3B7000-memory.dmp

      Filesize

      1.5MB

    • memory/836-167-0x00000247EE240000-0x00000247EE3B7000-memory.dmp

      Filesize

      1.5MB

    • memory/836-169-0x00000247EE240000-0x00000247EE3B7000-memory.dmp

      Filesize

      1.5MB

    • memory/836-171-0x00000247EE240000-0x00000247EE3B7000-memory.dmp

      Filesize

      1.5MB

    • memory/836-680-0x00000247EDA20000-0x00000247EDA30000-memory.dmp

      Filesize

      64KB

    • memory/836-211-0x00000247EE240000-0x00000247EE3B7000-memory.dmp

      Filesize

      1.5MB

    • memory/836-187-0x00000247EE240000-0x00000247EE3B7000-memory.dmp

      Filesize

      1.5MB

    • memory/836-179-0x00000247EE240000-0x00000247EE3B7000-memory.dmp

      Filesize

      1.5MB

    • memory/836-181-0x00000247EE240000-0x00000247EE3B7000-memory.dmp

      Filesize

      1.5MB

    • memory/836-183-0x00000247EE240000-0x00000247EE3B7000-memory.dmp

      Filesize

      1.5MB

    • memory/836-185-0x00000247EE240000-0x00000247EE3B7000-memory.dmp

      Filesize

      1.5MB

    • memory/836-177-0x00000247EE240000-0x00000247EE3B7000-memory.dmp

      Filesize

      1.5MB

    • memory/836-189-0x00000247EE240000-0x00000247EE3B7000-memory.dmp

      Filesize

      1.5MB

    • memory/836-191-0x00000247EE240000-0x00000247EE3B7000-memory.dmp

      Filesize

      1.5MB

    • memory/836-193-0x00000247EE240000-0x00000247EE3B7000-memory.dmp

      Filesize

      1.5MB

    • memory/836-195-0x00000247EE240000-0x00000247EE3B7000-memory.dmp

      Filesize

      1.5MB

    • memory/836-197-0x00000247EE240000-0x00000247EE3B7000-memory.dmp

      Filesize

      1.5MB

    • memory/836-199-0x00000247EE240000-0x00000247EE3B7000-memory.dmp

      Filesize

      1.5MB

    • memory/836-201-0x00000247EE240000-0x00000247EE3B7000-memory.dmp

      Filesize

      1.5MB

    • memory/836-203-0x00000247EE240000-0x00000247EE3B7000-memory.dmp

      Filesize

      1.5MB

    • memory/836-205-0x00000247EE240000-0x00000247EE3B7000-memory.dmp

      Filesize

      1.5MB

    • memory/836-207-0x00000247EE240000-0x00000247EE3B7000-memory.dmp

      Filesize

      1.5MB

    • memory/836-209-0x00000247EE240000-0x00000247EE3B7000-memory.dmp

      Filesize

      1.5MB

    • memory/4804-140-0x0000000000A50000-0x000000000105C000-memory.dmp

      Filesize

      6.0MB

    • memory/4804-142-0x0000000005960000-0x0000000005970000-memory.dmp

      Filesize

      64KB

    • memory/4804-141-0x0000000005960000-0x0000000005970000-memory.dmp

      Filesize

      64KB