Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14/02/2024, 04:57
Static task
static1
Behavioral task
behavioral1
Sample
9aceea76f4ccb33286e37aa91e15cb44.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9aceea76f4ccb33286e37aa91e15cb44.exe
Resource
win10v2004-20231222-en
General
-
Target
9aceea76f4ccb33286e37aa91e15cb44.exe
-
Size
957KB
-
MD5
9aceea76f4ccb33286e37aa91e15cb44
-
SHA1
c01c60f47bfabda0c99f6d434e6bf772e54fa9a8
-
SHA256
b11cb95a4f8665db55cc8a9f54cc0107d37c224adca1f3dfe9bcc50074a23cb2
-
SHA512
b341e4b9ad1ea41119016cbda2e6a75e3c4531827553eaeaf3e92b2c5a7cac90aefcd8b525bd0be239433719229aa11a05f6b064c064759f4fd92ebf7d3c6a78
-
SSDEEP
24576:ebb58UKrHWcxaW7lSR7BJkmjw2tjy1JiVJHPi:25+rWKaW5Stkmj381g
Malware Config
Extracted
blustealer
Protocol: smtp- Host:
mail.starkgulf.com - Port:
587 - Username:
[email protected] - Password:
info123#
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2172 set thread context of 2608 2172 9aceea76f4ccb33286e37aa91e15cb44.exe 32 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2172 9aceea76f4ccb33286e37aa91e15cb44.exe 2172 9aceea76f4ccb33286e37aa91e15cb44.exe 2172 9aceea76f4ccb33286e37aa91e15cb44.exe 2172 9aceea76f4ccb33286e37aa91e15cb44.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2172 9aceea76f4ccb33286e37aa91e15cb44.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2608 9aceea76f4ccb33286e37aa91e15cb44.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2660 2172 9aceea76f4ccb33286e37aa91e15cb44.exe 30 PID 2172 wrote to memory of 2660 2172 9aceea76f4ccb33286e37aa91e15cb44.exe 30 PID 2172 wrote to memory of 2660 2172 9aceea76f4ccb33286e37aa91e15cb44.exe 30 PID 2172 wrote to memory of 2660 2172 9aceea76f4ccb33286e37aa91e15cb44.exe 30 PID 2172 wrote to memory of 2820 2172 9aceea76f4ccb33286e37aa91e15cb44.exe 31 PID 2172 wrote to memory of 2820 2172 9aceea76f4ccb33286e37aa91e15cb44.exe 31 PID 2172 wrote to memory of 2820 2172 9aceea76f4ccb33286e37aa91e15cb44.exe 31 PID 2172 wrote to memory of 2820 2172 9aceea76f4ccb33286e37aa91e15cb44.exe 31 PID 2172 wrote to memory of 2608 2172 9aceea76f4ccb33286e37aa91e15cb44.exe 32 PID 2172 wrote to memory of 2608 2172 9aceea76f4ccb33286e37aa91e15cb44.exe 32 PID 2172 wrote to memory of 2608 2172 9aceea76f4ccb33286e37aa91e15cb44.exe 32 PID 2172 wrote to memory of 2608 2172 9aceea76f4ccb33286e37aa91e15cb44.exe 32 PID 2172 wrote to memory of 2608 2172 9aceea76f4ccb33286e37aa91e15cb44.exe 32 PID 2172 wrote to memory of 2608 2172 9aceea76f4ccb33286e37aa91e15cb44.exe 32 PID 2172 wrote to memory of 2608 2172 9aceea76f4ccb33286e37aa91e15cb44.exe 32 PID 2172 wrote to memory of 2608 2172 9aceea76f4ccb33286e37aa91e15cb44.exe 32 PID 2172 wrote to memory of 2608 2172 9aceea76f4ccb33286e37aa91e15cb44.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\9aceea76f4ccb33286e37aa91e15cb44.exe"C:\Users\Admin\AppData\Local\Temp\9aceea76f4ccb33286e37aa91e15cb44.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\9aceea76f4ccb33286e37aa91e15cb44.exe"C:\Users\Admin\AppData\Local\Temp\9aceea76f4ccb33286e37aa91e15cb44.exe"2⤵PID:2660
-
-
C:\Users\Admin\AppData\Local\Temp\9aceea76f4ccb33286e37aa91e15cb44.exe"C:\Users\Admin\AppData\Local\Temp\9aceea76f4ccb33286e37aa91e15cb44.exe"2⤵PID:2820
-
-
C:\Users\Admin\AppData\Local\Temp\9aceea76f4ccb33286e37aa91e15cb44.exe"C:\Users\Admin\AppData\Local\Temp\9aceea76f4ccb33286e37aa91e15cb44.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:2608
-