Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
21-12-2023 20:41
Static task
static1
Behavioral task
behavioral1
Sample
0464c8fb6d0d275b197e6424afdcfe85.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0464c8fb6d0d275b197e6424afdcfe85.exe
Resource
win10v2004-20231215-en
General
-
Target
0464c8fb6d0d275b197e6424afdcfe85.exe
-
Size
921KB
-
MD5
0464c8fb6d0d275b197e6424afdcfe85
-
SHA1
1ee7b29c21aadc96befa2f624ef92d43f0c3cd36
-
SHA256
aee13239725c7dcc72761f58f97145f2972aaaf9dc9e91bf0dd5497cb063b21c
-
SHA512
62cdb4e05549629036f4f2c512e145f25cc8b82aa554ce038ac5134e6451bc96fda228ca087ad9b20f98fda394d743eceaa6d0030c6325f47b7052db778d192e
-
SSDEEP
12288:apivtpJkLZHCv06s5bg8OsvepzZFc9MZZw7cdRJfOB66vKkPJTQK6YhyB6A9mhne:LMH6sRbO0epzsiccdqB66vbTk
Malware Config
Extracted
blustealer
Protocol: smtp- Host:
mail.starkgulf.com - Port:
587 - Username:
[email protected] - Password:
info123#
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2484 set thread context of 2632 2484 0464c8fb6d0d275b197e6424afdcfe85.exe 32 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2484 0464c8fb6d0d275b197e6424afdcfe85.exe 2484 0464c8fb6d0d275b197e6424afdcfe85.exe 2484 0464c8fb6d0d275b197e6424afdcfe85.exe 2484 0464c8fb6d0d275b197e6424afdcfe85.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2484 0464c8fb6d0d275b197e6424afdcfe85.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2632 0464c8fb6d0d275b197e6424afdcfe85.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2484 wrote to memory of 2752 2484 0464c8fb6d0d275b197e6424afdcfe85.exe 30 PID 2484 wrote to memory of 2752 2484 0464c8fb6d0d275b197e6424afdcfe85.exe 30 PID 2484 wrote to memory of 2752 2484 0464c8fb6d0d275b197e6424afdcfe85.exe 30 PID 2484 wrote to memory of 2752 2484 0464c8fb6d0d275b197e6424afdcfe85.exe 30 PID 2484 wrote to memory of 2620 2484 0464c8fb6d0d275b197e6424afdcfe85.exe 31 PID 2484 wrote to memory of 2620 2484 0464c8fb6d0d275b197e6424afdcfe85.exe 31 PID 2484 wrote to memory of 2620 2484 0464c8fb6d0d275b197e6424afdcfe85.exe 31 PID 2484 wrote to memory of 2620 2484 0464c8fb6d0d275b197e6424afdcfe85.exe 31 PID 2484 wrote to memory of 2632 2484 0464c8fb6d0d275b197e6424afdcfe85.exe 32 PID 2484 wrote to memory of 2632 2484 0464c8fb6d0d275b197e6424afdcfe85.exe 32 PID 2484 wrote to memory of 2632 2484 0464c8fb6d0d275b197e6424afdcfe85.exe 32 PID 2484 wrote to memory of 2632 2484 0464c8fb6d0d275b197e6424afdcfe85.exe 32 PID 2484 wrote to memory of 2632 2484 0464c8fb6d0d275b197e6424afdcfe85.exe 32 PID 2484 wrote to memory of 2632 2484 0464c8fb6d0d275b197e6424afdcfe85.exe 32 PID 2484 wrote to memory of 2632 2484 0464c8fb6d0d275b197e6424afdcfe85.exe 32 PID 2484 wrote to memory of 2632 2484 0464c8fb6d0d275b197e6424afdcfe85.exe 32 PID 2484 wrote to memory of 2632 2484 0464c8fb6d0d275b197e6424afdcfe85.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\0464c8fb6d0d275b197e6424afdcfe85.exe"C:\Users\Admin\AppData\Local\Temp\0464c8fb6d0d275b197e6424afdcfe85.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\0464c8fb6d0d275b197e6424afdcfe85.exe"C:\Users\Admin\AppData\Local\Temp\0464c8fb6d0d275b197e6424afdcfe85.exe"2⤵PID:2752
-
-
C:\Users\Admin\AppData\Local\Temp\0464c8fb6d0d275b197e6424afdcfe85.exe"C:\Users\Admin\AppData\Local\Temp\0464c8fb6d0d275b197e6424afdcfe85.exe"2⤵PID:2620
-
-
C:\Users\Admin\AppData\Local\Temp\0464c8fb6d0d275b197e6424afdcfe85.exe"C:\Users\Admin\AppData\Local\Temp\0464c8fb6d0d275b197e6424afdcfe85.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:2632
-