Analysis
-
max time kernel
143s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20220722-en -
resource tags
arch:x64arch:x86image:win10v2004-20220722-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2022 13:11
Static task
static1
Behavioral task
behavioral1
Sample
Swift Remittance (M-103)-USD-565.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
Swift Remittance (M-103)-USD-565.exe
Resource
win10v2004-20220722-en
General
-
Target
Swift Remittance (M-103)-USD-565.exe
-
Size
678KB
-
MD5
acce170c053656447b94bf4f1b47b272
-
SHA1
2203b6a8201c47b505fc2f65831ecbbcc7f3d65a
-
SHA256
15f15c2249333a073c8ba95ebd2e8c23d0778ecc0c83fe9bc80d36513037ad2b
-
SHA512
fafb1564a47cfbf4ae011129c2b52f3db78d4250d59068381d71423df221d23b0e9ef29f9ea5efcd159bcb161d678cdf1a0fb987de6a708f2d83aa13c45c4c8e
Malware Config
Extracted
blustealer
Protocol: smtp- Host:
smtp.ionos.es - Port:
587 - Username:
[email protected] - Password:
barkoner
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Loads dropped DLL 2 IoCs
pid Process 3400 vbc.exe 3400 vbc.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4840 set thread context of 3400 4840 Swift Remittance (M-103)-USD-565.exe 82 PID 3400 set thread context of 2944 3400 vbc.exe 84 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4840 Swift Remittance (M-103)-USD-565.exe 4840 Swift Remittance (M-103)-USD-565.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4840 Swift Remittance (M-103)-USD-565.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3400 vbc.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4840 wrote to memory of 1944 4840 Swift Remittance (M-103)-USD-565.exe 81 PID 4840 wrote to memory of 1944 4840 Swift Remittance (M-103)-USD-565.exe 81 PID 4840 wrote to memory of 1944 4840 Swift Remittance (M-103)-USD-565.exe 81 PID 4840 wrote to memory of 3400 4840 Swift Remittance (M-103)-USD-565.exe 82 PID 4840 wrote to memory of 3400 4840 Swift Remittance (M-103)-USD-565.exe 82 PID 4840 wrote to memory of 3400 4840 Swift Remittance (M-103)-USD-565.exe 82 PID 4840 wrote to memory of 3400 4840 Swift Remittance (M-103)-USD-565.exe 82 PID 4840 wrote to memory of 3400 4840 Swift Remittance (M-103)-USD-565.exe 82 PID 4840 wrote to memory of 3400 4840 Swift Remittance (M-103)-USD-565.exe 82 PID 4840 wrote to memory of 3400 4840 Swift Remittance (M-103)-USD-565.exe 82 PID 4840 wrote to memory of 3400 4840 Swift Remittance (M-103)-USD-565.exe 82 PID 3400 wrote to memory of 2944 3400 vbc.exe 84 PID 3400 wrote to memory of 2944 3400 vbc.exe 84 PID 3400 wrote to memory of 2944 3400 vbc.exe 84 PID 3400 wrote to memory of 2944 3400 vbc.exe 84 PID 3400 wrote to memory of 2944 3400 vbc.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\Swift Remittance (M-103)-USD-565.exe"C:\Users\Admin\AppData\Local\Temp\Swift Remittance (M-103)-USD-565.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵PID:1944
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\InstallUtil.exe3⤵PID:2944
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD5d77b227a28a78627c2323cac75948390
SHA1e228c3951f2a9fd0febfe07390633ab4f35727f4
SHA256527ec201dcd7695bd9830eb82ab35a3986121de9ea156193834aed9d79223b82
SHA5125627fbc8bbb98f644e21f101a68f0e0b07b87c264d00ea227286bed8ab6dd4ebf5114f03b632604f775ff93666a409a1a179a81ebfc9246956ba8150ff5b0587
-
Filesize
585KB
MD55405413fff79b8d9c747aa900f60f082
SHA171caf8907ddd9a3a25d71356bd2ce09bd293bd78
SHA2563e5a28ffde07ac661c26b6ccf94e64c1c90b1f25b3b24c90605aa922b87642eb
SHA5122f09a30fc4da5166bd665210fefa1d44ce344f0ec6a37f127d677aeb3ca4fc0d09b7c9c1540f57da1e3449b7f588a1c61115395e965fa153d4baa5033266ed66