Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12-01-2024 12:02
Static task
static1
Behavioral task
behavioral1
Sample
56688aac45f687d84e6c849c54e0a7df.exe
Resource
win7-20231215-en
windows7-x64
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
56688aac45f687d84e6c849c54e0a7df.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
8 signatures
150 seconds
General
-
Target
56688aac45f687d84e6c849c54e0a7df.exe
-
Size
720KB
-
MD5
56688aac45f687d84e6c849c54e0a7df
-
SHA1
16de7a0e6e04e270690298eb65371080d3ba845d
-
SHA256
cc940530ec434423139fc9ce98906ba0f74ad6d4d8f482148ad896da57b87f0d
-
SHA512
7a20a9069d52914095ac667ee877c62372ec9ec351d4f7e204efdfb2be6c57be59d54fc517bb0f639437aa45f0884fec14e38e3a51fbdc97be33dd2bc9532cbe
-
SSDEEP
12288:UtmbQmxRoMLzeDiWLq2KkzAhhv+bOCYE418hzx7O7PRuo2fHU1:UY05kmALoHYH18hVO7Zuoc01
Score
10/10
Malware Config
Extracted
Family
blustealer
Credentials
Protocol: smtp- Host:
netjul.xyz - Port:
587 - Username:
[email protected] - Password:
t+Ip=i&C}jY5
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral1/memory/2976-6-0x0000000008480000-0x00000000084FC000-memory.dmp family_zgrat_v1 behavioral1/memory/2976-10-0x0000000008480000-0x00000000084F6000-memory.dmp family_zgrat_v1 behavioral1/memory/2976-8-0x0000000008480000-0x00000000084F6000-memory.dmp family_zgrat_v1 behavioral1/memory/2976-7-0x0000000008480000-0x00000000084F6000-memory.dmp family_zgrat_v1 behavioral1/memory/2976-14-0x0000000008480000-0x00000000084F6000-memory.dmp family_zgrat_v1 behavioral1/memory/2976-12-0x0000000008480000-0x00000000084F6000-memory.dmp family_zgrat_v1 behavioral1/memory/2976-18-0x0000000008480000-0x00000000084F6000-memory.dmp family_zgrat_v1 behavioral1/memory/2976-20-0x0000000008480000-0x00000000084F6000-memory.dmp family_zgrat_v1 behavioral1/memory/2976-24-0x0000000008480000-0x00000000084F6000-memory.dmp family_zgrat_v1 behavioral1/memory/2976-44-0x0000000008480000-0x00000000084F6000-memory.dmp family_zgrat_v1 behavioral1/memory/2976-56-0x0000000008480000-0x00000000084F6000-memory.dmp family_zgrat_v1 behavioral1/memory/2976-62-0x0000000008480000-0x00000000084F6000-memory.dmp family_zgrat_v1 behavioral1/memory/2976-60-0x0000000008480000-0x00000000084F6000-memory.dmp family_zgrat_v1 behavioral1/memory/2976-58-0x0000000008480000-0x00000000084F6000-memory.dmp family_zgrat_v1 behavioral1/memory/2976-54-0x0000000008480000-0x00000000084F6000-memory.dmp family_zgrat_v1 behavioral1/memory/2976-64-0x0000000008480000-0x00000000084F6000-memory.dmp family_zgrat_v1 behavioral1/memory/2976-66-0x0000000008480000-0x00000000084F6000-memory.dmp family_zgrat_v1 behavioral1/memory/2976-52-0x0000000008480000-0x00000000084F6000-memory.dmp family_zgrat_v1 behavioral1/memory/2976-70-0x0000000008480000-0x00000000084F6000-memory.dmp family_zgrat_v1 behavioral1/memory/2976-68-0x0000000008480000-0x00000000084F6000-memory.dmp family_zgrat_v1 behavioral1/memory/2976-50-0x0000000008480000-0x00000000084F6000-memory.dmp family_zgrat_v1 behavioral1/memory/2976-48-0x0000000008480000-0x00000000084F6000-memory.dmp family_zgrat_v1 behavioral1/memory/2976-46-0x0000000008480000-0x00000000084F6000-memory.dmp family_zgrat_v1 behavioral1/memory/2976-42-0x0000000008480000-0x00000000084F6000-memory.dmp family_zgrat_v1 behavioral1/memory/2976-40-0x0000000008480000-0x00000000084F6000-memory.dmp family_zgrat_v1 behavioral1/memory/2976-38-0x0000000008480000-0x00000000084F6000-memory.dmp family_zgrat_v1 behavioral1/memory/2976-36-0x0000000008480000-0x00000000084F6000-memory.dmp family_zgrat_v1 behavioral1/memory/2976-34-0x0000000008480000-0x00000000084F6000-memory.dmp family_zgrat_v1 behavioral1/memory/2976-32-0x0000000008480000-0x00000000084F6000-memory.dmp family_zgrat_v1 behavioral1/memory/2976-30-0x0000000008480000-0x00000000084F6000-memory.dmp family_zgrat_v1 behavioral1/memory/2976-28-0x0000000008480000-0x00000000084F6000-memory.dmp family_zgrat_v1 behavioral1/memory/2976-26-0x0000000008480000-0x00000000084F6000-memory.dmp family_zgrat_v1 behavioral1/memory/2976-22-0x0000000008480000-0x00000000084F6000-memory.dmp family_zgrat_v1 behavioral1/memory/2976-16-0x0000000008480000-0x00000000084F6000-memory.dmp family_zgrat_v1 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2976 set thread context of 1344 2976 56688aac45f687d84e6c849c54e0a7df.exe 30 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2976 56688aac45f687d84e6c849c54e0a7df.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2976 56688aac45f687d84e6c849c54e0a7df.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1344 56688aac45f687d84e6c849c54e0a7df.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2976 wrote to memory of 1344 2976 56688aac45f687d84e6c849c54e0a7df.exe 30 PID 2976 wrote to memory of 1344 2976 56688aac45f687d84e6c849c54e0a7df.exe 30 PID 2976 wrote to memory of 1344 2976 56688aac45f687d84e6c849c54e0a7df.exe 30 PID 2976 wrote to memory of 1344 2976 56688aac45f687d84e6c849c54e0a7df.exe 30 PID 2976 wrote to memory of 1344 2976 56688aac45f687d84e6c849c54e0a7df.exe 30 PID 2976 wrote to memory of 1344 2976 56688aac45f687d84e6c849c54e0a7df.exe 30 PID 2976 wrote to memory of 1344 2976 56688aac45f687d84e6c849c54e0a7df.exe 30 PID 2976 wrote to memory of 1344 2976 56688aac45f687d84e6c849c54e0a7df.exe 30 PID 2976 wrote to memory of 1344 2976 56688aac45f687d84e6c849c54e0a7df.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\56688aac45f687d84e6c849c54e0a7df.exe"C:\Users\Admin\AppData\Local\Temp\56688aac45f687d84e6c849c54e0a7df.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\56688aac45f687d84e6c849c54e0a7df.exeC:\Users\Admin\AppData\Local\Temp\56688aac45f687d84e6c849c54e0a7df.exe2⤵
- Suspicious use of SetWindowsHookEx
PID:1344
-