Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2024, 04:57
Static task
static1
Behavioral task
behavioral1
Sample
9aceea76f4ccb33286e37aa91e15cb44.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9aceea76f4ccb33286e37aa91e15cb44.exe
Resource
win10v2004-20231222-en
General
-
Target
9aceea76f4ccb33286e37aa91e15cb44.exe
-
Size
957KB
-
MD5
9aceea76f4ccb33286e37aa91e15cb44
-
SHA1
c01c60f47bfabda0c99f6d434e6bf772e54fa9a8
-
SHA256
b11cb95a4f8665db55cc8a9f54cc0107d37c224adca1f3dfe9bcc50074a23cb2
-
SHA512
b341e4b9ad1ea41119016cbda2e6a75e3c4531827553eaeaf3e92b2c5a7cac90aefcd8b525bd0be239433719229aa11a05f6b064c064759f4fd92ebf7d3c6a78
-
SSDEEP
24576:ebb58UKrHWcxaW7lSR7BJkmjw2tjy1JiVJHPi:25+rWKaW5Stkmj381g
Malware Config
Extracted
blustealer
Protocol: smtp- Host:
mail.starkgulf.com - Port:
587 - Username:
[email protected] - Password:
info123#
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4940 set thread context of 3040 4940 9aceea76f4ccb33286e37aa91e15cb44.exe 96 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3040 9aceea76f4ccb33286e37aa91e15cb44.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4940 wrote to memory of 3040 4940 9aceea76f4ccb33286e37aa91e15cb44.exe 96 PID 4940 wrote to memory of 3040 4940 9aceea76f4ccb33286e37aa91e15cb44.exe 96 PID 4940 wrote to memory of 3040 4940 9aceea76f4ccb33286e37aa91e15cb44.exe 96 PID 4940 wrote to memory of 3040 4940 9aceea76f4ccb33286e37aa91e15cb44.exe 96 PID 4940 wrote to memory of 3040 4940 9aceea76f4ccb33286e37aa91e15cb44.exe 96 PID 4940 wrote to memory of 3040 4940 9aceea76f4ccb33286e37aa91e15cb44.exe 96 PID 4940 wrote to memory of 3040 4940 9aceea76f4ccb33286e37aa91e15cb44.exe 96 PID 4940 wrote to memory of 3040 4940 9aceea76f4ccb33286e37aa91e15cb44.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\9aceea76f4ccb33286e37aa91e15cb44.exe"C:\Users\Admin\AppData\Local\Temp\9aceea76f4ccb33286e37aa91e15cb44.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\9aceea76f4ccb33286e37aa91e15cb44.exe"C:\Users\Admin\AppData\Local\Temp\9aceea76f4ccb33286e37aa91e15cb44.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:3040
-