Analysis

  • max time kernel
    46s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220715-en
  • resource tags

    arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system
  • submitted
    27-07-2022 13:11

General

  • Target

    Swift Remittance (M-103)-USD-565.exe

  • Size

    678KB

  • MD5

    acce170c053656447b94bf4f1b47b272

  • SHA1

    2203b6a8201c47b505fc2f65831ecbbcc7f3d65a

  • SHA256

    15f15c2249333a073c8ba95ebd2e8c23d0778ecc0c83fe9bc80d36513037ad2b

  • SHA512

    fafb1564a47cfbf4ae011129c2b52f3db78d4250d59068381d71423df221d23b0e9ef29f9ea5efcd159bcb161d678cdf1a0fb987de6a708f2d83aa13c45c4c8e

Score
10/10

Malware Config

Extracted

Family

blustealer

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.ionos.es
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    barkoner

Signatures

  • BluStealer

    A Modular information stealer written in Visual Basic.

  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Swift Remittance (M-103)-USD-565.exe
    "C:\Users\Admin\AppData\Local\Temp\Swift Remittance (M-103)-USD-565.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:532
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
      2⤵
        PID:996
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:956
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\InstallUtil.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\InstallUtil.exe
          3⤵
            PID:1176

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • \Users\Public\3037384246424646303030333036443242464246463030303330\SQLite3_StdCall.dll

        Filesize

        59KB

        MD5

        d77b227a28a78627c2323cac75948390

        SHA1

        e228c3951f2a9fd0febfe07390633ab4f35727f4

        SHA256

        527ec201dcd7695bd9830eb82ab35a3986121de9ea156193834aed9d79223b82

        SHA512

        5627fbc8bbb98f644e21f101a68f0e0b07b87c264d00ea227286bed8ab6dd4ebf5114f03b632604f775ff93666a409a1a179a81ebfc9246956ba8150ff5b0587

      • \Users\Public\3037384246424646303030333036443242464246463030303330\sqlite3.dll

        Filesize

        585KB

        MD5

        5405413fff79b8d9c747aa900f60f082

        SHA1

        71caf8907ddd9a3a25d71356bd2ce09bd293bd78

        SHA256

        3e5a28ffde07ac661c26b6ccf94e64c1c90b1f25b3b24c90605aa922b87642eb

        SHA512

        2f09a30fc4da5166bd665210fefa1d44ce344f0ec6a37f127d677aeb3ca4fc0d09b7c9c1540f57da1e3449b7f588a1c61115395e965fa153d4baa5033266ed66

      • memory/532-54-0x0000000000CE0000-0x0000000000D8C000-memory.dmp

        Filesize

        688KB

      • memory/532-55-0x0000000000A80000-0x0000000000B1A000-memory.dmp

        Filesize

        616KB

      • memory/532-56-0x0000000000880000-0x000000000091C000-memory.dmp

        Filesize

        624KB

      • memory/956-68-0x00000000766A1000-0x00000000766A3000-memory.dmp

        Filesize

        8KB

      • memory/956-58-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/956-60-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/956-69-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/956-82-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/956-57-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/956-62-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/1176-75-0x00000000000E0000-0x00000000000EE000-memory.dmp

        Filesize

        56KB

      • memory/1176-77-0x00000000000E0000-0x00000000000EE000-memory.dmp

        Filesize

        56KB

      • memory/1176-72-0x00000000000E0000-0x00000000000EE000-memory.dmp

        Filesize

        56KB

      • memory/1176-81-0x0000000074660000-0x0000000074C0B000-memory.dmp

        Filesize

        5.7MB

      • memory/1176-70-0x00000000000E0000-0x00000000000EE000-memory.dmp

        Filesize

        56KB