Analysis

  • max time kernel
    45s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    20-06-2022 17:13

General

  • Target

    BPL_1057230.exe

  • Size

    187KB

  • MD5

    72048fbaab48b29537a9b8b6af6bd37d

  • SHA1

    fb253b22ae678164dad4de1f8f472a1338c8582a

  • SHA256

    77053cffbf81fc755f5d119b907f63456ff18706a3274bf619315baf03411087

  • SHA512

    8909e498201a610020fd59e7bfc1340da71dc0ca8a4205adaba12151dd50a0cb0e88b0b358a361ecec5d6cefa5708bc7a19dea21e5b9d857d1057fce27640601

Malware Config

Extracted

Family

blustealer

Credentials

  • Protocol:
    smtp
  • Host:
    mail.juhun.shop
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    (_ZH%s&u{1FF

Signatures

  • BluStealer

    A Modular information stealer written in Visual Basic.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\BPL_1057230.exe
    "C:\Users\Admin\AppData\Local\Temp\BPL_1057230.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1564
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c timeout 11
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2044
      • C:\Windows\SysWOW64\timeout.exe
        timeout 11
        3⤵
        • Delays execution with timeout.exe
        PID:2016
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1848

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1564-54-0x0000000000860000-0x0000000000894000-memory.dmp

    Filesize

    208KB

  • memory/1564-55-0x00000000763B1000-0x00000000763B3000-memory.dmp

    Filesize

    8KB

  • memory/1564-56-0x0000000007C70000-0x0000000007D96000-memory.dmp

    Filesize

    1.1MB

  • memory/1564-57-0x0000000005190000-0x00000000051DC000-memory.dmp

    Filesize

    304KB

  • memory/1848-60-0x0000000000400000-0x000000000049F000-memory.dmp

    Filesize

    636KB

  • memory/1848-61-0x0000000000400000-0x000000000049F000-memory.dmp

    Filesize

    636KB

  • memory/1848-63-0x0000000000400000-0x000000000049F000-memory.dmp

    Filesize

    636KB

  • memory/1848-65-0x0000000000400000-0x000000000049F000-memory.dmp

    Filesize

    636KB

  • memory/1848-66-0x0000000000403878-mapping.dmp

  • memory/1848-68-0x0000000000400000-0x000000000049F000-memory.dmp

    Filesize

    636KB

  • memory/1848-71-0x0000000000400000-0x000000000049F000-memory.dmp

    Filesize

    636KB

  • memory/2016-59-0x0000000000000000-mapping.dmp

  • memory/2044-58-0x0000000000000000-mapping.dmp