Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
15-01-2024 18:10
Static task
static1
Behavioral task
behavioral1
Sample
5dbd6684e5601b2f8e748e02fa898558.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5dbd6684e5601b2f8e748e02fa898558.exe
Resource
win10v2004-20231215-en
General
-
Target
5dbd6684e5601b2f8e748e02fa898558.exe
-
Size
892KB
-
MD5
5dbd6684e5601b2f8e748e02fa898558
-
SHA1
9a83397decf87975576dbb4fced3d9b611846c39
-
SHA256
3d92d6a34be40684493e0cee2f5c772ec4a1f731cf8b371cad1eb9c492d9f63d
-
SHA512
79cdc806624ff9ad1e2f5e20280880db099055380d0d27a4560d846288280b4d076c3f2e0b4742e665454db3df1f2f9f9d84abacad8c17fea99dc7e1772e27d9
-
SSDEEP
12288:1FYf861bQyPlY7a3q6GQShv8me5CZMg/ln1/7x8a0Ti+l:1i06xQta3qxapkFLo2
Malware Config
Extracted
blustealer
Protocol: smtp- Host:
bojtai.xyz - Port:
587 - Username:
[email protected] - Password:
(mr.GT^Eg#C6
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Detect ZGRat V1 8 IoCs
resource yara_rule behavioral1/memory/1704-67-0x0000000004D50000-0x0000000004DB2000-memory.dmp family_zgrat_v1 behavioral1/memory/1704-68-0x0000000004D50000-0x0000000004DAC000-memory.dmp family_zgrat_v1 behavioral1/memory/1704-71-0x0000000004D50000-0x0000000004DAC000-memory.dmp family_zgrat_v1 behavioral1/memory/1704-69-0x0000000004D50000-0x0000000004DAC000-memory.dmp family_zgrat_v1 behavioral1/memory/1704-73-0x0000000004D50000-0x0000000004DAC000-memory.dmp family_zgrat_v1 behavioral1/memory/1704-79-0x0000000004D50000-0x0000000004DAC000-memory.dmp family_zgrat_v1 behavioral1/memory/1704-77-0x0000000004D50000-0x0000000004DAC000-memory.dmp family_zgrat_v1 behavioral1/memory/1704-75-0x0000000004D50000-0x0000000004DAC000-memory.dmp family_zgrat_v1 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Run\chr = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\chro\\chr.exe\"" 5dbd6684e5601b2f8e748e02fa898558.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1704 set thread context of 1068 1704 5dbd6684e5601b2f8e748e02fa898558.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2392 powershell.exe 1704 5dbd6684e5601b2f8e748e02fa898558.exe 1704 5dbd6684e5601b2f8e748e02fa898558.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeDebugPrivilege 2392 powershell.exe Token: SeIncreaseQuotaPrivilege 2392 powershell.exe Token: SeSecurityPrivilege 2392 powershell.exe Token: SeTakeOwnershipPrivilege 2392 powershell.exe Token: SeLoadDriverPrivilege 2392 powershell.exe Token: SeSystemProfilePrivilege 2392 powershell.exe Token: SeSystemtimePrivilege 2392 powershell.exe Token: SeProfSingleProcessPrivilege 2392 powershell.exe Token: SeIncBasePriorityPrivilege 2392 powershell.exe Token: SeCreatePagefilePrivilege 2392 powershell.exe Token: SeBackupPrivilege 2392 powershell.exe Token: SeRestorePrivilege 2392 powershell.exe Token: SeShutdownPrivilege 2392 powershell.exe Token: SeDebugPrivilege 2392 powershell.exe Token: SeSystemEnvironmentPrivilege 2392 powershell.exe Token: SeRemoteShutdownPrivilege 2392 powershell.exe Token: SeUndockPrivilege 2392 powershell.exe Token: SeManageVolumePrivilege 2392 powershell.exe Token: 33 2392 powershell.exe Token: 34 2392 powershell.exe Token: 35 2392 powershell.exe Token: SeDebugPrivilege 1704 5dbd6684e5601b2f8e748e02fa898558.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1068 5dbd6684e5601b2f8e748e02fa898558.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2392 1704 5dbd6684e5601b2f8e748e02fa898558.exe 28 PID 1704 wrote to memory of 2392 1704 5dbd6684e5601b2f8e748e02fa898558.exe 28 PID 1704 wrote to memory of 2392 1704 5dbd6684e5601b2f8e748e02fa898558.exe 28 PID 1704 wrote to memory of 2392 1704 5dbd6684e5601b2f8e748e02fa898558.exe 28 PID 1704 wrote to memory of 1068 1704 5dbd6684e5601b2f8e748e02fa898558.exe 33 PID 1704 wrote to memory of 1068 1704 5dbd6684e5601b2f8e748e02fa898558.exe 33 PID 1704 wrote to memory of 1068 1704 5dbd6684e5601b2f8e748e02fa898558.exe 33 PID 1704 wrote to memory of 1068 1704 5dbd6684e5601b2f8e748e02fa898558.exe 33 PID 1704 wrote to memory of 1068 1704 5dbd6684e5601b2f8e748e02fa898558.exe 33 PID 1704 wrote to memory of 1068 1704 5dbd6684e5601b2f8e748e02fa898558.exe 33 PID 1704 wrote to memory of 1068 1704 5dbd6684e5601b2f8e748e02fa898558.exe 33 PID 1704 wrote to memory of 1068 1704 5dbd6684e5601b2f8e748e02fa898558.exe 33 PID 1704 wrote to memory of 1068 1704 5dbd6684e5601b2f8e748e02fa898558.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\5dbd6684e5601b2f8e748e02fa898558.exe"C:\Users\Admin\AppData\Local\Temp\5dbd6684e5601b2f8e748e02fa898558.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.8, 8.8.4.4, time.google.com2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2392
-
-
C:\Users\Admin\AppData\Local\Temp\5dbd6684e5601b2f8e748e02fa898558.exeC:\Users\Admin\AppData\Local\Temp\5dbd6684e5601b2f8e748e02fa898558.exe2⤵
- Suspicious use of SetWindowsHookEx
PID:1068
-