Analysis
-
max time kernel
45s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-06-2022 17:13
Static task
static1
Behavioral task
behavioral1
Sample
BPL_1057230.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
BPL_1057230.exe
Resource
win10v2004-20220414-en
General
-
Target
BPL_1057230.exe
-
Size
187KB
-
MD5
72048fbaab48b29537a9b8b6af6bd37d
-
SHA1
fb253b22ae678164dad4de1f8f472a1338c8582a
-
SHA256
77053cffbf81fc755f5d119b907f63456ff18706a3274bf619315baf03411087
-
SHA512
8909e498201a610020fd59e7bfc1340da71dc0ca8a4205adaba12151dd50a0cb0e88b0b358a361ecec5d6cefa5708bc7a19dea21e5b9d857d1057fce27640601
Malware Config
Extracted
blustealer
Protocol: smtp- Host:
mail.juhun.shop - Port:
587 - Username:
[email protected] - Password:
(_ZH%s&u{1FF
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
BPL_1057230.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run\Rvkkghcc = "\"C:\\Users\\Admin\\AppData\\Roaming\\Gqguc\\Rvkkghcc.exe\"" BPL_1057230.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
BPL_1057230.exedescription pid Process procid_target PID 1564 set thread context of 1848 1564 BPL_1057230.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid Process 2016 timeout.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
BPL_1057230.exepid Process 1564 BPL_1057230.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
BPL_1057230.exedescription pid Process Token: SeDebugPrivilege 1564 BPL_1057230.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
InstallUtil.exepid Process 1848 InstallUtil.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
BPL_1057230.execmd.exedescription pid Process procid_target PID 1564 wrote to memory of 2044 1564 BPL_1057230.exe 27 PID 1564 wrote to memory of 2044 1564 BPL_1057230.exe 27 PID 1564 wrote to memory of 2044 1564 BPL_1057230.exe 27 PID 1564 wrote to memory of 2044 1564 BPL_1057230.exe 27 PID 2044 wrote to memory of 2016 2044 cmd.exe 29 PID 2044 wrote to memory of 2016 2044 cmd.exe 29 PID 2044 wrote to memory of 2016 2044 cmd.exe 29 PID 2044 wrote to memory of 2016 2044 cmd.exe 29 PID 1564 wrote to memory of 1848 1564 BPL_1057230.exe 30 PID 1564 wrote to memory of 1848 1564 BPL_1057230.exe 30 PID 1564 wrote to memory of 1848 1564 BPL_1057230.exe 30 PID 1564 wrote to memory of 1848 1564 BPL_1057230.exe 30 PID 1564 wrote to memory of 1848 1564 BPL_1057230.exe 30 PID 1564 wrote to memory of 1848 1564 BPL_1057230.exe 30 PID 1564 wrote to memory of 1848 1564 BPL_1057230.exe 30 PID 1564 wrote to memory of 1848 1564 BPL_1057230.exe 30 PID 1564 wrote to memory of 1848 1564 BPL_1057230.exe 30 PID 1564 wrote to memory of 1848 1564 BPL_1057230.exe 30 PID 1564 wrote to memory of 1848 1564 BPL_1057230.exe 30 PID 1564 wrote to memory of 1848 1564 BPL_1057230.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\BPL_1057230.exe"C:\Users\Admin\AppData\Local\Temp\BPL_1057230.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 112⤵
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\timeout.exetimeout 113⤵
- Delays execution with timeout.exe
PID:2016
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵
- Suspicious use of SetWindowsHookEx
PID:1848
-