Resubmissions

27-07-2022 05:34

220727-f9d1eaafel 10

27-07-2022 05:04

220727-fqbqyaadfn 10

Analysis

  • max time kernel
    174s
  • max time network
    177s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220721-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-07-2022 05:34

General

  • Target

    vbc.exe

  • Size

    73KB

  • MD5

    01d52c9116e69104be59982ec44b4f9a

  • SHA1

    d6f901d3488a21e6856563c46d560518cb218549

  • SHA256

    de3fc0f64c0ea18339e50d84f79e5e7f144f0e4b4ec725bb3cc48208a1491577

  • SHA512

    a6731650991c837dfde3666bfeb2214b02c21aa810bca59244f84b5cd7a383b17695d4d6831f45eea6520f1d2b1faa16a74107487580533a2a1927c0569fa2cb

Score
10/10

Malware Config

Signatures

  • BluStealer

    A Modular information stealer written in Visual Basic.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Uses the VBS compiler for execution 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 48 IoCs
  • Suspicious use of SendNotifyMessage 48 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\vbc.exe
    "C:\Users\Admin\AppData\Local\Temp\vbc.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4380
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2736
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:116
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1432

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/116-148-0x0000000000400000-0x0000000000495000-memory.dmp

    Filesize

    596KB

  • memory/116-147-0x0000000000400000-0x0000000000495000-memory.dmp

    Filesize

    596KB

  • memory/116-144-0x0000000000400000-0x0000000000495000-memory.dmp

    Filesize

    596KB

  • memory/116-142-0x0000000000400000-0x0000000000495000-memory.dmp

    Filesize

    596KB

  • memory/2736-134-0x0000000002370000-0x00000000023A6000-memory.dmp

    Filesize

    216KB

  • memory/2736-136-0x0000000004E70000-0x0000000004ED6000-memory.dmp

    Filesize

    408KB

  • memory/2736-137-0x0000000005670000-0x00000000056D6000-memory.dmp

    Filesize

    408KB

  • memory/2736-138-0x0000000005C90000-0x0000000005CAE000-memory.dmp

    Filesize

    120KB

  • memory/2736-139-0x00000000074F0000-0x0000000007B6A000-memory.dmp

    Filesize

    6.5MB

  • memory/2736-140-0x0000000006190000-0x00000000061AA000-memory.dmp

    Filesize

    104KB

  • memory/2736-135-0x0000000004FD0000-0x00000000055F8000-memory.dmp

    Filesize

    6.2MB

  • memory/4380-130-0x0000000000180000-0x0000000000198000-memory.dmp

    Filesize

    96KB

  • memory/4380-132-0x0000000005F10000-0x0000000005F32000-memory.dmp

    Filesize

    136KB

  • memory/4380-131-0x00000000051F0000-0x0000000005794000-memory.dmp

    Filesize

    5.6MB