Analysis

  • max time kernel
    145s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-01-2024 14:49

General

  • Target

    67e35ba1e64e085fe1226951b88517dc.exe

  • Size

    651KB

  • MD5

    67e35ba1e64e085fe1226951b88517dc

  • SHA1

    42252dafdea79b21ff6385715b66fe23ef82680f

  • SHA256

    65eeb38ef21735b46b448ba2359cdf12a9f5041e8f0df7385f63be59760bc645

  • SHA512

    a6cf53d8d53e8fc2a27834bc63172ac5ffda94f02a3ef3dd0fca235f5f5c930c2271d0bd0ecf810694ea58b3ac1dbd0b72fe46dbe2b249c08f62b6ca0459f614

  • SSDEEP

    12288:1gTXomEQUwTNl1v3iWo6GPU5WJg7MPW/hrJAmNZ5DD1ovdmKNxQVvnKb0u:1KE2pzXo6GJw9/h1AmNzRoEKnQBKw

Malware Config

Extracted

Family

blustealer

Credentials

  • Protocol:
    smtp
  • Host:
    bojtai.xyz
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    (mr.GT^Eg#C6

Signatures

  • BluStealer

    A Modular information stealer written in Visual Basic.

  • Detect ZGRat V1 34 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\67e35ba1e64e085fe1226951b88517dc.exe
    "C:\Users\Admin\AppData\Local\Temp\67e35ba1e64e085fe1226951b88517dc.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1508
    • C:\Users\Admin\AppData\Local\Temp\67e35ba1e64e085fe1226951b88517dc.exe
      C:\Users\Admin\AppData\Local\Temp\67e35ba1e64e085fe1226951b88517dc.exe
      2⤵
        PID:4524
      • C:\Users\Admin\AppData\Local\Temp\67e35ba1e64e085fe1226951b88517dc.exe
        C:\Users\Admin\AppData\Local\Temp\67e35ba1e64e085fe1226951b88517dc.exe
        2⤵
          PID:2700
        • C:\Users\Admin\AppData\Local\Temp\67e35ba1e64e085fe1226951b88517dc.exe
          C:\Users\Admin\AppData\Local\Temp\67e35ba1e64e085fe1226951b88517dc.exe
          2⤵
            PID:3540
          • C:\Users\Admin\AppData\Local\Temp\67e35ba1e64e085fe1226951b88517dc.exe
            C:\Users\Admin\AppData\Local\Temp\67e35ba1e64e085fe1226951b88517dc.exe
            2⤵
            • Suspicious use of SetWindowsHookEx
            PID:4220

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1508-35-0x00000000083B0000-0x0000000008416000-memory.dmp

          Filesize

          408KB

        • memory/1508-71-0x00000000083B0000-0x0000000008416000-memory.dmp

          Filesize

          408KB

        • memory/1508-2-0x00000000054A0000-0x0000000005A44000-memory.dmp

          Filesize

          5.6MB

        • memory/1508-3-0x0000000004F90000-0x0000000005022000-memory.dmp

          Filesize

          584KB

        • memory/1508-4-0x0000000005190000-0x00000000051A0000-memory.dmp

          Filesize

          64KB

        • memory/1508-5-0x0000000005140000-0x000000000514A000-memory.dmp

          Filesize

          40KB

        • memory/1508-6-0x0000000005190000-0x00000000051A0000-memory.dmp

          Filesize

          64KB

        • memory/1508-7-0x0000000074FF0000-0x00000000757A0000-memory.dmp

          Filesize

          7.7MB

        • memory/1508-8-0x0000000005190000-0x00000000051A0000-memory.dmp

          Filesize

          64KB

        • memory/1508-9-0x0000000007E30000-0x0000000007ED2000-memory.dmp

          Filesize

          648KB

        • memory/1508-10-0x0000000005190000-0x00000000051A0000-memory.dmp

          Filesize

          64KB

        • memory/1508-11-0x00000000083B0000-0x000000000841C000-memory.dmp

          Filesize

          432KB

        • memory/1508-12-0x00000000083B0000-0x0000000008416000-memory.dmp

          Filesize

          408KB

        • memory/1508-13-0x00000000083B0000-0x0000000008416000-memory.dmp

          Filesize

          408KB

        • memory/1508-31-0x00000000083B0000-0x0000000008416000-memory.dmp

          Filesize

          408KB

        • memory/1508-19-0x00000000083B0000-0x0000000008416000-memory.dmp

          Filesize

          408KB

        • memory/1508-17-0x00000000083B0000-0x0000000008416000-memory.dmp

          Filesize

          408KB

        • memory/1508-21-0x00000000083B0000-0x0000000008416000-memory.dmp

          Filesize

          408KB

        • memory/1508-23-0x00000000083B0000-0x0000000008416000-memory.dmp

          Filesize

          408KB

        • memory/1508-25-0x00000000083B0000-0x0000000008416000-memory.dmp

          Filesize

          408KB

        • memory/1508-27-0x00000000083B0000-0x0000000008416000-memory.dmp

          Filesize

          408KB

        • memory/1508-29-0x00000000083B0000-0x0000000008416000-memory.dmp

          Filesize

          408KB

        • memory/1508-15-0x00000000083B0000-0x0000000008416000-memory.dmp

          Filesize

          408KB

        • memory/1508-1-0x0000000000500000-0x00000000005A8000-memory.dmp

          Filesize

          672KB

        • memory/1508-51-0x00000000083B0000-0x0000000008416000-memory.dmp

          Filesize

          408KB

        • memory/1508-37-0x00000000083B0000-0x0000000008416000-memory.dmp

          Filesize

          408KB

        • memory/1508-39-0x00000000083B0000-0x0000000008416000-memory.dmp

          Filesize

          408KB

        • memory/1508-41-0x00000000083B0000-0x0000000008416000-memory.dmp

          Filesize

          408KB

        • memory/1508-43-0x00000000083B0000-0x0000000008416000-memory.dmp

          Filesize

          408KB

        • memory/1508-45-0x00000000083B0000-0x0000000008416000-memory.dmp

          Filesize

          408KB

        • memory/1508-47-0x00000000083B0000-0x0000000008416000-memory.dmp

          Filesize

          408KB

        • memory/1508-49-0x00000000083B0000-0x0000000008416000-memory.dmp

          Filesize

          408KB

        • memory/1508-0-0x0000000074FF0000-0x00000000757A0000-memory.dmp

          Filesize

          7.7MB

        • memory/1508-53-0x00000000083B0000-0x0000000008416000-memory.dmp

          Filesize

          408KB

        • memory/1508-55-0x00000000083B0000-0x0000000008416000-memory.dmp

          Filesize

          408KB

        • memory/1508-57-0x00000000083B0000-0x0000000008416000-memory.dmp

          Filesize

          408KB

        • memory/1508-59-0x00000000083B0000-0x0000000008416000-memory.dmp

          Filesize

          408KB

        • memory/1508-61-0x00000000083B0000-0x0000000008416000-memory.dmp

          Filesize

          408KB

        • memory/1508-63-0x00000000083B0000-0x0000000008416000-memory.dmp

          Filesize

          408KB

        • memory/1508-65-0x00000000083B0000-0x0000000008416000-memory.dmp

          Filesize

          408KB

        • memory/1508-67-0x00000000083B0000-0x0000000008416000-memory.dmp

          Filesize

          408KB

        • memory/1508-69-0x00000000083B0000-0x0000000008416000-memory.dmp

          Filesize

          408KB

        • memory/1508-33-0x00000000083B0000-0x0000000008416000-memory.dmp

          Filesize

          408KB

        • memory/1508-73-0x00000000083B0000-0x0000000008416000-memory.dmp

          Filesize

          408KB

        • memory/1508-75-0x00000000083B0000-0x0000000008416000-memory.dmp

          Filesize

          408KB

        • memory/1508-2122-0x0000000074FF0000-0x00000000757A0000-memory.dmp

          Filesize

          7.7MB

        • memory/4220-2120-0x0000000000400000-0x0000000000476000-memory.dmp

          Filesize

          472KB

        • memory/4220-2123-0x0000000000400000-0x0000000000476000-memory.dmp

          Filesize

          472KB