Analysis
-
max time kernel
47s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
27-07-2022 12:11
Static task
static1
Behavioral task
behavioral1
Sample
AMC-C1702-2022-TRADING.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
AMC-C1702-2022-TRADING.exe
Resource
win10v2004-20220721-en
General
-
Target
AMC-C1702-2022-TRADING.exe
-
Size
823KB
-
MD5
7cb6bad3520dfe8cf6f6c430eb822230
-
SHA1
79c40a60a489e81e0984e3fd5977086b82d4da7e
-
SHA256
5acba03de2ea77f11d0ad772a6141ca9e6f3305c00a468ebcb10c2608722a474
-
SHA512
eeda9a5473768cc80f3f2e6229cea0049932d239cf6762395647b52cfeb4dde75980425889ebb0002e260ed8015cb812c7265cc7c6455acb35a9c4df5e5c2634
Malware Config
Extracted
blustealer
Protocol: smtp- Host:
smtp.ionos.es - Port:
587 - Username:
[email protected] - Password:
barkoner
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Loads dropped DLL 2 IoCs
pid Process 1980 vbc.exe 1980 vbc.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1824 set thread context of 1980 1824 AMC-C1702-2022-TRADING.exe 26 PID 1980 set thread context of 1836 1980 vbc.exe 28 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1980 vbc.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1824 wrote to memory of 1980 1824 AMC-C1702-2022-TRADING.exe 26 PID 1824 wrote to memory of 1980 1824 AMC-C1702-2022-TRADING.exe 26 PID 1824 wrote to memory of 1980 1824 AMC-C1702-2022-TRADING.exe 26 PID 1824 wrote to memory of 1980 1824 AMC-C1702-2022-TRADING.exe 26 PID 1824 wrote to memory of 1980 1824 AMC-C1702-2022-TRADING.exe 26 PID 1824 wrote to memory of 1980 1824 AMC-C1702-2022-TRADING.exe 26 PID 1824 wrote to memory of 1980 1824 AMC-C1702-2022-TRADING.exe 26 PID 1824 wrote to memory of 1980 1824 AMC-C1702-2022-TRADING.exe 26 PID 1824 wrote to memory of 1980 1824 AMC-C1702-2022-TRADING.exe 26 PID 1980 wrote to memory of 1836 1980 vbc.exe 28 PID 1980 wrote to memory of 1836 1980 vbc.exe 28 PID 1980 wrote to memory of 1836 1980 vbc.exe 28 PID 1980 wrote to memory of 1836 1980 vbc.exe 28 PID 1980 wrote to memory of 1836 1980 vbc.exe 28 PID 1980 wrote to memory of 1836 1980 vbc.exe 28 PID 1980 wrote to memory of 1836 1980 vbc.exe 28 PID 1980 wrote to memory of 1836 1980 vbc.exe 28 PID 1980 wrote to memory of 1836 1980 vbc.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\AMC-C1702-2022-TRADING.exe"C:\Users\Admin\AppData\Local\Temp\AMC-C1702-2022-TRADING.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\InstallUtil.exe3⤵PID:1836
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD5d77b227a28a78627c2323cac75948390
SHA1e228c3951f2a9fd0febfe07390633ab4f35727f4
SHA256527ec201dcd7695bd9830eb82ab35a3986121de9ea156193834aed9d79223b82
SHA5125627fbc8bbb98f644e21f101a68f0e0b07b87c264d00ea227286bed8ab6dd4ebf5114f03b632604f775ff93666a409a1a179a81ebfc9246956ba8150ff5b0587
-
Filesize
585KB
MD55405413fff79b8d9c747aa900f60f082
SHA171caf8907ddd9a3a25d71356bd2ce09bd293bd78
SHA2563e5a28ffde07ac661c26b6ccf94e64c1c90b1f25b3b24c90605aa922b87642eb
SHA5122f09a30fc4da5166bd665210fefa1d44ce344f0ec6a37f127d677aeb3ca4fc0d09b7c9c1540f57da1e3449b7f588a1c61115395e965fa153d4baa5033266ed66