Analysis
-
max time kernel
43s -
max time network
57s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
04-11-2021 11:09
Static task
static1
Behavioral task
behavioral1
Sample
doc3723636638837373344.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
doc3723636638837373344.exe
Resource
win10-en-20210920
General
-
Target
doc3723636638837373344.exe
-
Size
546KB
-
MD5
bb0f727180c9b29e51c9ab2a9b4c539c
-
SHA1
ccd4d7a83603d2471aabb0caf2e1196b9193b586
-
SHA256
2b6b5926ec7e5d6acea355bbd8f43a89850ed85e0c3739edfad2608ead9f1573
-
SHA512
ce0670de14582f900b89149cb63fdfe171d188a1a7752d72ed068e57775c54557817acd09148d93725bd52456ed901de8e6b6d0fec0d064b24b46fa8dab7e5d5
Malware Config
Extracted
blustealer
Protocol: smtp- Host:
mail.yekamuhendislik.com - Port:
587 - Username:
[email protected] - Password:
MuhasebE123*
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
doc3723636638837373344.exedescription pid process target process PID 3484 set thread context of 1536 3484 doc3723636638837373344.exe doc3723636638837373344.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
doc3723636638837373344.exepid process 3484 doc3723636638837373344.exe 3484 doc3723636638837373344.exe 3484 doc3723636638837373344.exe 3484 doc3723636638837373344.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
doc3723636638837373344.exedescription pid process Token: SeDebugPrivilege 3484 doc3723636638837373344.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
doc3723636638837373344.exedescription pid process target process PID 3484 wrote to memory of 3320 3484 doc3723636638837373344.exe schtasks.exe PID 3484 wrote to memory of 3320 3484 doc3723636638837373344.exe schtasks.exe PID 3484 wrote to memory of 3320 3484 doc3723636638837373344.exe schtasks.exe PID 3484 wrote to memory of 1536 3484 doc3723636638837373344.exe doc3723636638837373344.exe PID 3484 wrote to memory of 1536 3484 doc3723636638837373344.exe doc3723636638837373344.exe PID 3484 wrote to memory of 1536 3484 doc3723636638837373344.exe doc3723636638837373344.exe PID 3484 wrote to memory of 1536 3484 doc3723636638837373344.exe doc3723636638837373344.exe PID 3484 wrote to memory of 1536 3484 doc3723636638837373344.exe doc3723636638837373344.exe PID 3484 wrote to memory of 1536 3484 doc3723636638837373344.exe doc3723636638837373344.exe PID 3484 wrote to memory of 1536 3484 doc3723636638837373344.exe doc3723636638837373344.exe PID 3484 wrote to memory of 1536 3484 doc3723636638837373344.exe doc3723636638837373344.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\doc3723636638837373344.exe"C:\Users\Admin\AppData\Local\Temp\doc3723636638837373344.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ARXXSy" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7309.tmp"2⤵
- Creates scheduled task(s)
PID:3320
-
-
C:\Users\Admin\AppData\Local\Temp\doc3723636638837373344.exe"C:\Users\Admin\AppData\Local\Temp\doc3723636638837373344.exe"2⤵PID:1536
-