Analysis

  • max time kernel
    153s
  • max time network
    189s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    20-06-2022 17:07

General

  • Target

    77053cffbf81fc755f5d119b907f63456ff18706a3274bf619315baf03411087.exe

  • Size

    187KB

  • MD5

    72048fbaab48b29537a9b8b6af6bd37d

  • SHA1

    fb253b22ae678164dad4de1f8f472a1338c8582a

  • SHA256

    77053cffbf81fc755f5d119b907f63456ff18706a3274bf619315baf03411087

  • SHA512

    8909e498201a610020fd59e7bfc1340da71dc0ca8a4205adaba12151dd50a0cb0e88b0b358a361ecec5d6cefa5708bc7a19dea21e5b9d857d1057fce27640601

Malware Config

Extracted

Family

blustealer

Credentials

  • Protocol:
    smtp
  • Host:
    mail.juhun.shop
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    (_ZH%s&u{1FF

Signatures

  • BluStealer

    A Modular information stealer written in Visual Basic.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\77053cffbf81fc755f5d119b907f63456ff18706a3274bf619315baf03411087.exe
    "C:\Users\Admin\AppData\Local\Temp\77053cffbf81fc755f5d119b907f63456ff18706a3274bf619315baf03411087.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1768
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c timeout 11
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2704
      • C:\Windows\SysWOW64\timeout.exe
        timeout 11
        3⤵
        • Delays execution with timeout.exe
        PID:4916
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      2⤵
        PID:2596
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        2⤵
          PID:4032
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
          2⤵
          • Suspicious use of SetWindowsHookEx
          PID:524

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/524-143-0x0000000000400000-0x000000000049F000-memory.dmp

        Filesize

        636KB

      • memory/524-147-0x0000000000400000-0x000000000049F000-memory.dmp

        Filesize

        636KB

      • memory/524-146-0x0000000000400000-0x000000000049F000-memory.dmp

        Filesize

        636KB

      • memory/524-140-0x0000000000000000-mapping.dmp

      • memory/524-141-0x0000000000400000-0x000000000049F000-memory.dmp

        Filesize

        636KB

      • memory/1768-131-0x0000000005DA0000-0x0000000006344000-memory.dmp

        Filesize

        5.6MB

      • memory/1768-132-0x0000000005710000-0x00000000057A2000-memory.dmp

        Filesize

        584KB

      • memory/1768-133-0x00000000057B0000-0x00000000057BA000-memory.dmp

        Filesize

        40KB

      • memory/1768-134-0x0000000007BC0000-0x0000000007C36000-memory.dmp

        Filesize

        472KB

      • memory/1768-135-0x0000000008B50000-0x0000000008B6E000-memory.dmp

        Filesize

        120KB

      • memory/1768-130-0x0000000000D40000-0x0000000000D74000-memory.dmp

        Filesize

        208KB

      • memory/2596-138-0x0000000000000000-mapping.dmp

      • memory/2704-136-0x0000000000000000-mapping.dmp

      • memory/4032-139-0x0000000000000000-mapping.dmp

      • memory/4916-137-0x0000000000000000-mapping.dmp