Analysis
-
max time kernel
46s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
27-07-2022 13:11
Static task
static1
Behavioral task
behavioral1
Sample
Swift Remittance (M-103)-USD-565.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
Swift Remittance (M-103)-USD-565.exe
Resource
win10v2004-20220722-en
General
-
Target
Swift Remittance (M-103)-USD-565.exe
-
Size
678KB
-
MD5
acce170c053656447b94bf4f1b47b272
-
SHA1
2203b6a8201c47b505fc2f65831ecbbcc7f3d65a
-
SHA256
15f15c2249333a073c8ba95ebd2e8c23d0778ecc0c83fe9bc80d36513037ad2b
-
SHA512
fafb1564a47cfbf4ae011129c2b52f3db78d4250d59068381d71423df221d23b0e9ef29f9ea5efcd159bcb161d678cdf1a0fb987de6a708f2d83aa13c45c4c8e
Malware Config
Extracted
blustealer
Protocol: smtp- Host:
smtp.ionos.es - Port:
587 - Username:
[email protected] - Password:
barkoner
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Loads dropped DLL 2 IoCs
pid Process 956 vbc.exe 956 vbc.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 532 set thread context of 956 532 Swift Remittance (M-103)-USD-565.exe 28 PID 956 set thread context of 1176 956 vbc.exe 30 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 532 Swift Remittance (M-103)-USD-565.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 532 Swift Remittance (M-103)-USD-565.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 956 vbc.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 532 wrote to memory of 996 532 Swift Remittance (M-103)-USD-565.exe 27 PID 532 wrote to memory of 996 532 Swift Remittance (M-103)-USD-565.exe 27 PID 532 wrote to memory of 996 532 Swift Remittance (M-103)-USD-565.exe 27 PID 532 wrote to memory of 996 532 Swift Remittance (M-103)-USD-565.exe 27 PID 532 wrote to memory of 956 532 Swift Remittance (M-103)-USD-565.exe 28 PID 532 wrote to memory of 956 532 Swift Remittance (M-103)-USD-565.exe 28 PID 532 wrote to memory of 956 532 Swift Remittance (M-103)-USD-565.exe 28 PID 532 wrote to memory of 956 532 Swift Remittance (M-103)-USD-565.exe 28 PID 532 wrote to memory of 956 532 Swift Remittance (M-103)-USD-565.exe 28 PID 532 wrote to memory of 956 532 Swift Remittance (M-103)-USD-565.exe 28 PID 532 wrote to memory of 956 532 Swift Remittance (M-103)-USD-565.exe 28 PID 532 wrote to memory of 956 532 Swift Remittance (M-103)-USD-565.exe 28 PID 532 wrote to memory of 956 532 Swift Remittance (M-103)-USD-565.exe 28 PID 956 wrote to memory of 1176 956 vbc.exe 30 PID 956 wrote to memory of 1176 956 vbc.exe 30 PID 956 wrote to memory of 1176 956 vbc.exe 30 PID 956 wrote to memory of 1176 956 vbc.exe 30 PID 956 wrote to memory of 1176 956 vbc.exe 30 PID 956 wrote to memory of 1176 956 vbc.exe 30 PID 956 wrote to memory of 1176 956 vbc.exe 30 PID 956 wrote to memory of 1176 956 vbc.exe 30 PID 956 wrote to memory of 1176 956 vbc.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Swift Remittance (M-103)-USD-565.exe"C:\Users\Admin\AppData\Local\Temp\Swift Remittance (M-103)-USD-565.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵PID:996
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\InstallUtil.exe3⤵PID:1176
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD5d77b227a28a78627c2323cac75948390
SHA1e228c3951f2a9fd0febfe07390633ab4f35727f4
SHA256527ec201dcd7695bd9830eb82ab35a3986121de9ea156193834aed9d79223b82
SHA5125627fbc8bbb98f644e21f101a68f0e0b07b87c264d00ea227286bed8ab6dd4ebf5114f03b632604f775ff93666a409a1a179a81ebfc9246956ba8150ff5b0587
-
Filesize
585KB
MD55405413fff79b8d9c747aa900f60f082
SHA171caf8907ddd9a3a25d71356bd2ce09bd293bd78
SHA2563e5a28ffde07ac661c26b6ccf94e64c1c90b1f25b3b24c90605aa922b87642eb
SHA5122f09a30fc4da5166bd665210fefa1d44ce344f0ec6a37f127d677aeb3ca4fc0d09b7c9c1540f57da1e3449b7f588a1c61115395e965fa153d4baa5033266ed66