Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/01/2024, 14:49
Static task
static1
Behavioral task
behavioral1
Sample
67e35ba1e64e085fe1226951b88517dc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
67e35ba1e64e085fe1226951b88517dc.exe
Resource
win10v2004-20231215-en
General
-
Target
67e35ba1e64e085fe1226951b88517dc.exe
-
Size
651KB
-
MD5
67e35ba1e64e085fe1226951b88517dc
-
SHA1
42252dafdea79b21ff6385715b66fe23ef82680f
-
SHA256
65eeb38ef21735b46b448ba2359cdf12a9f5041e8f0df7385f63be59760bc645
-
SHA512
a6cf53d8d53e8fc2a27834bc63172ac5ffda94f02a3ef3dd0fca235f5f5c930c2271d0bd0ecf810694ea58b3ac1dbd0b72fe46dbe2b249c08f62b6ca0459f614
-
SSDEEP
12288:1gTXomEQUwTNl1v3iWo6GPU5WJg7MPW/hrJAmNZ5DD1ovdmKNxQVvnKb0u:1KE2pzXo6GJw9/h1AmNzRoEKnQBKw
Malware Config
Extracted
blustealer
Protocol: smtp- Host:
bojtai.xyz - Port:
587 - Username:
[email protected] - Password:
(mr.GT^Eg#C6
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral1/memory/2684-8-0x0000000004E60000-0x0000000004ECC000-memory.dmp family_zgrat_v1 behavioral1/memory/2684-9-0x0000000004E60000-0x0000000004EC6000-memory.dmp family_zgrat_v1 behavioral1/memory/2684-10-0x0000000004E60000-0x0000000004EC6000-memory.dmp family_zgrat_v1 behavioral1/memory/2684-12-0x0000000004E60000-0x0000000004EC6000-memory.dmp family_zgrat_v1 behavioral1/memory/2684-18-0x0000000004E60000-0x0000000004EC6000-memory.dmp family_zgrat_v1 behavioral1/memory/2684-16-0x0000000004E60000-0x0000000004EC6000-memory.dmp family_zgrat_v1 behavioral1/memory/2684-14-0x0000000004E60000-0x0000000004EC6000-memory.dmp family_zgrat_v1 behavioral1/memory/2684-22-0x0000000004E60000-0x0000000004EC6000-memory.dmp family_zgrat_v1 behavioral1/memory/2684-24-0x0000000004E60000-0x0000000004EC6000-memory.dmp family_zgrat_v1 behavioral1/memory/2684-28-0x0000000004E60000-0x0000000004EC6000-memory.dmp family_zgrat_v1 behavioral1/memory/2684-26-0x0000000004E60000-0x0000000004EC6000-memory.dmp family_zgrat_v1 behavioral1/memory/2684-20-0x0000000004E60000-0x0000000004EC6000-memory.dmp family_zgrat_v1 behavioral1/memory/2684-30-0x0000000004E60000-0x0000000004EC6000-memory.dmp family_zgrat_v1 behavioral1/memory/2684-34-0x0000000004E60000-0x0000000004EC6000-memory.dmp family_zgrat_v1 behavioral1/memory/2684-36-0x0000000004E60000-0x0000000004EC6000-memory.dmp family_zgrat_v1 behavioral1/memory/2684-32-0x0000000004E60000-0x0000000004EC6000-memory.dmp family_zgrat_v1 behavioral1/memory/2684-38-0x0000000004E60000-0x0000000004EC6000-memory.dmp family_zgrat_v1 behavioral1/memory/2684-42-0x0000000004E60000-0x0000000004EC6000-memory.dmp family_zgrat_v1 behavioral1/memory/2684-44-0x0000000004E60000-0x0000000004EC6000-memory.dmp family_zgrat_v1 behavioral1/memory/2684-40-0x0000000004E60000-0x0000000004EC6000-memory.dmp family_zgrat_v1 behavioral1/memory/2684-52-0x0000000004E60000-0x0000000004EC6000-memory.dmp family_zgrat_v1 behavioral1/memory/2684-56-0x0000000004E60000-0x0000000004EC6000-memory.dmp family_zgrat_v1 behavioral1/memory/2684-58-0x0000000004E60000-0x0000000004EC6000-memory.dmp family_zgrat_v1 behavioral1/memory/2684-54-0x0000000004E60000-0x0000000004EC6000-memory.dmp family_zgrat_v1 behavioral1/memory/2684-50-0x0000000004E60000-0x0000000004EC6000-memory.dmp family_zgrat_v1 behavioral1/memory/2684-48-0x0000000004E60000-0x0000000004EC6000-memory.dmp family_zgrat_v1 behavioral1/memory/2684-63-0x0000000004E60000-0x0000000004EC6000-memory.dmp family_zgrat_v1 behavioral1/memory/2684-61-0x0000000004E60000-0x0000000004EC6000-memory.dmp family_zgrat_v1 behavioral1/memory/2684-46-0x0000000004E60000-0x0000000004EC6000-memory.dmp family_zgrat_v1 behavioral1/memory/2684-65-0x0000000004E60000-0x0000000004EC6000-memory.dmp family_zgrat_v1 behavioral1/memory/2684-73-0x0000000004E60000-0x0000000004EC6000-memory.dmp family_zgrat_v1 behavioral1/memory/2684-71-0x0000000004E60000-0x0000000004EC6000-memory.dmp family_zgrat_v1 behavioral1/memory/2684-69-0x0000000004E60000-0x0000000004EC6000-memory.dmp family_zgrat_v1 behavioral1/memory/2684-67-0x0000000004E60000-0x0000000004EC6000-memory.dmp family_zgrat_v1 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Run\chrom = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\chrome\\chrom.exe\"" 67e35ba1e64e085fe1226951b88517dc.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2684 set thread context of 2356 2684 67e35ba1e64e085fe1226951b88517dc.exe 29 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2684 67e35ba1e64e085fe1226951b88517dc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2684 67e35ba1e64e085fe1226951b88517dc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2356 67e35ba1e64e085fe1226951b88517dc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2684 wrote to memory of 2356 2684 67e35ba1e64e085fe1226951b88517dc.exe 29 PID 2684 wrote to memory of 2356 2684 67e35ba1e64e085fe1226951b88517dc.exe 29 PID 2684 wrote to memory of 2356 2684 67e35ba1e64e085fe1226951b88517dc.exe 29 PID 2684 wrote to memory of 2356 2684 67e35ba1e64e085fe1226951b88517dc.exe 29 PID 2684 wrote to memory of 2356 2684 67e35ba1e64e085fe1226951b88517dc.exe 29 PID 2684 wrote to memory of 2356 2684 67e35ba1e64e085fe1226951b88517dc.exe 29 PID 2684 wrote to memory of 2356 2684 67e35ba1e64e085fe1226951b88517dc.exe 29 PID 2684 wrote to memory of 2356 2684 67e35ba1e64e085fe1226951b88517dc.exe 29 PID 2684 wrote to memory of 2356 2684 67e35ba1e64e085fe1226951b88517dc.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\67e35ba1e64e085fe1226951b88517dc.exe"C:\Users\Admin\AppData\Local\Temp\67e35ba1e64e085fe1226951b88517dc.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\67e35ba1e64e085fe1226951b88517dc.exeC:\Users\Admin\AppData\Local\Temp\67e35ba1e64e085fe1226951b88517dc.exe2⤵
- Suspicious use of SetWindowsHookEx
PID:2356
-