Analysis
-
max time kernel
153s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-06-2022 17:07
Static task
static1
Behavioral task
behavioral1
Sample
77053cffbf81fc755f5d119b907f63456ff18706a3274bf619315baf03411087.exe
Resource
win10v2004-20220414-en
General
-
Target
77053cffbf81fc755f5d119b907f63456ff18706a3274bf619315baf03411087.exe
-
Size
187KB
-
MD5
72048fbaab48b29537a9b8b6af6bd37d
-
SHA1
fb253b22ae678164dad4de1f8f472a1338c8582a
-
SHA256
77053cffbf81fc755f5d119b907f63456ff18706a3274bf619315baf03411087
-
SHA512
8909e498201a610020fd59e7bfc1340da71dc0ca8a4205adaba12151dd50a0cb0e88b0b358a361ecec5d6cefa5708bc7a19dea21e5b9d857d1057fce27640601
Malware Config
Extracted
blustealer
Protocol: smtp- Host:
mail.juhun.shop - Port:
587 - Username:
[email protected] - Password:
(_ZH%s&u{1FF
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
77053cffbf81fc755f5d119b907f63456ff18706a3274bf619315baf03411087.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation 77053cffbf81fc755f5d119b907f63456ff18706a3274bf619315baf03411087.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
77053cffbf81fc755f5d119b907f63456ff18706a3274bf619315baf03411087.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rvkkghcc = "\"C:\\Users\\Admin\\AppData\\Roaming\\Gqguc\\Rvkkghcc.exe\"" 77053cffbf81fc755f5d119b907f63456ff18706a3274bf619315baf03411087.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
77053cffbf81fc755f5d119b907f63456ff18706a3274bf619315baf03411087.exedescription pid Process procid_target PID 1768 set thread context of 524 1768 77053cffbf81fc755f5d119b907f63456ff18706a3274bf619315baf03411087.exe 90 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid Process 4916 timeout.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
77053cffbf81fc755f5d119b907f63456ff18706a3274bf619315baf03411087.exepid Process 1768 77053cffbf81fc755f5d119b907f63456ff18706a3274bf619315baf03411087.exe 1768 77053cffbf81fc755f5d119b907f63456ff18706a3274bf619315baf03411087.exe 1768 77053cffbf81fc755f5d119b907f63456ff18706a3274bf619315baf03411087.exe 1768 77053cffbf81fc755f5d119b907f63456ff18706a3274bf619315baf03411087.exe 1768 77053cffbf81fc755f5d119b907f63456ff18706a3274bf619315baf03411087.exe 1768 77053cffbf81fc755f5d119b907f63456ff18706a3274bf619315baf03411087.exe 1768 77053cffbf81fc755f5d119b907f63456ff18706a3274bf619315baf03411087.exe 1768 77053cffbf81fc755f5d119b907f63456ff18706a3274bf619315baf03411087.exe 1768 77053cffbf81fc755f5d119b907f63456ff18706a3274bf619315baf03411087.exe 1768 77053cffbf81fc755f5d119b907f63456ff18706a3274bf619315baf03411087.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
77053cffbf81fc755f5d119b907f63456ff18706a3274bf619315baf03411087.exedescription pid Process Token: SeDebugPrivilege 1768 77053cffbf81fc755f5d119b907f63456ff18706a3274bf619315baf03411087.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
InstallUtil.exepid Process 524 InstallUtil.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
77053cffbf81fc755f5d119b907f63456ff18706a3274bf619315baf03411087.execmd.exedescription pid Process procid_target PID 1768 wrote to memory of 2704 1768 77053cffbf81fc755f5d119b907f63456ff18706a3274bf619315baf03411087.exe 84 PID 1768 wrote to memory of 2704 1768 77053cffbf81fc755f5d119b907f63456ff18706a3274bf619315baf03411087.exe 84 PID 1768 wrote to memory of 2704 1768 77053cffbf81fc755f5d119b907f63456ff18706a3274bf619315baf03411087.exe 84 PID 2704 wrote to memory of 4916 2704 cmd.exe 85 PID 2704 wrote to memory of 4916 2704 cmd.exe 85 PID 2704 wrote to memory of 4916 2704 cmd.exe 85 PID 1768 wrote to memory of 2596 1768 77053cffbf81fc755f5d119b907f63456ff18706a3274bf619315baf03411087.exe 88 PID 1768 wrote to memory of 2596 1768 77053cffbf81fc755f5d119b907f63456ff18706a3274bf619315baf03411087.exe 88 PID 1768 wrote to memory of 2596 1768 77053cffbf81fc755f5d119b907f63456ff18706a3274bf619315baf03411087.exe 88 PID 1768 wrote to memory of 4032 1768 77053cffbf81fc755f5d119b907f63456ff18706a3274bf619315baf03411087.exe 89 PID 1768 wrote to memory of 4032 1768 77053cffbf81fc755f5d119b907f63456ff18706a3274bf619315baf03411087.exe 89 PID 1768 wrote to memory of 4032 1768 77053cffbf81fc755f5d119b907f63456ff18706a3274bf619315baf03411087.exe 89 PID 1768 wrote to memory of 524 1768 77053cffbf81fc755f5d119b907f63456ff18706a3274bf619315baf03411087.exe 90 PID 1768 wrote to memory of 524 1768 77053cffbf81fc755f5d119b907f63456ff18706a3274bf619315baf03411087.exe 90 PID 1768 wrote to memory of 524 1768 77053cffbf81fc755f5d119b907f63456ff18706a3274bf619315baf03411087.exe 90 PID 1768 wrote to memory of 524 1768 77053cffbf81fc755f5d119b907f63456ff18706a3274bf619315baf03411087.exe 90 PID 1768 wrote to memory of 524 1768 77053cffbf81fc755f5d119b907f63456ff18706a3274bf619315baf03411087.exe 90 PID 1768 wrote to memory of 524 1768 77053cffbf81fc755f5d119b907f63456ff18706a3274bf619315baf03411087.exe 90 PID 1768 wrote to memory of 524 1768 77053cffbf81fc755f5d119b907f63456ff18706a3274bf619315baf03411087.exe 90 PID 1768 wrote to memory of 524 1768 77053cffbf81fc755f5d119b907f63456ff18706a3274bf619315baf03411087.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\77053cffbf81fc755f5d119b907f63456ff18706a3274bf619315baf03411087.exe"C:\Users\Admin\AppData\Local\Temp\77053cffbf81fc755f5d119b907f63456ff18706a3274bf619315baf03411087.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 112⤵
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\timeout.exetimeout 113⤵
- Delays execution with timeout.exe
PID:4916
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵PID:2596
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵PID:4032
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵
- Suspicious use of SetWindowsHookEx
PID:524
-