Analysis
-
max time kernel
135s -
max time network
73s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
27-09-2021 14:11
Static task
static1
Behavioral task
behavioral1
Sample
YTHK21082400.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
YTHK21082400.exe
Resource
win10v20210408
General
-
Target
YTHK21082400.exe
-
Size
6KB
-
MD5
3ffff737bfe1a900b328599fe9da58b6
-
SHA1
64a930f90248f8e1702fc29a40860081076a7b38
-
SHA256
d27b2ee1f364b72f66ea452754cf56477c5028ab5c6ad0041fb97d9c40506639
-
SHA512
570813e30b91a93f916ec078b3aa2076062e8d2ca22f5b63fdc9708f86ce7444bc2d78f84e4d40ba349feb52133e8581ad3b7fc32cef44ead5c26f9d1e5fe984
Malware Config
Extracted
blustealer
Protocol: smtp- Host:
mail.enche.com - Port:
587 - Username:
[email protected] - Password:
Merchandise08012021
Signatures
-
A310logger
A310 Logger is a .NET stealer/logger targeting passwords from browsers and email clients.
-
BluStealer
A Modular information stealer written in Visual Basic.
-
A310logger Executable 2 IoCs
resource yara_rule behavioral2/files/0x000100000001ab59-124.dat a310logger behavioral2/files/0x000100000001ab59-125.dat a310logger -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 4008 Fox.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Fox.exe Key opened \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Fox.exe Key opened \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Fox.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 664 set thread context of 2732 664 YTHK21082400.exe 71 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 664 YTHK21082400.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2732 InstallUtil.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 664 wrote to memory of 2732 664 YTHK21082400.exe 71 PID 664 wrote to memory of 2732 664 YTHK21082400.exe 71 PID 664 wrote to memory of 2732 664 YTHK21082400.exe 71 PID 664 wrote to memory of 2732 664 YTHK21082400.exe 71 PID 664 wrote to memory of 2732 664 YTHK21082400.exe 71 PID 664 wrote to memory of 2732 664 YTHK21082400.exe 71 PID 664 wrote to memory of 2732 664 YTHK21082400.exe 71 PID 664 wrote to memory of 2732 664 YTHK21082400.exe 71 PID 2732 wrote to memory of 4008 2732 InstallUtil.exe 72 PID 2732 wrote to memory of 4008 2732 InstallUtil.exe 72 PID 2732 wrote to memory of 3868 2732 InstallUtil.exe 78 PID 2732 wrote to memory of 3868 2732 InstallUtil.exe 78 PID 2732 wrote to memory of 3868 2732 InstallUtil.exe 78 PID 3868 wrote to memory of 3040 3868 WinMail.exe 79 PID 3868 wrote to memory of 3040 3868 WinMail.exe 79 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Fox.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Fox.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\YTHK21082400.exe"C:\Users\Admin\AppData\Local\Temp\YTHK21082400.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\NET4\Fox.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\NET4\Fox.exe3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:4008
-
-
C:\Program Files (x86)\Windows Mail\WinMail.exe"C:\Program Files (x86)\Windows Mail\WinMail" OCInstallUserConfigOE3⤵
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail" OCInstallUserConfigOE4⤵PID:3040
-
-
-