Analysis
-
max time kernel
148s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
04-08-2022 08:57
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Variant.Barys.42241.11208.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Variant.Barys.42241.11208.exe
Resource
win10v2004-20220721-en
General
-
Target
SecuriteInfo.com.Variant.Barys.42241.11208.exe
-
Size
873KB
-
MD5
0cf7d7bfef7f90ec7738d843de48f8b0
-
SHA1
1d1acaa521f0b04301d350831c97d0d4cc34e2f7
-
SHA256
91be6258668b873244ec00091e663437dbb0967ee31406538376560de2b9a0e2
-
SHA512
43a22929ffc929f4b4de106b307bd68b50a82d34166f12b300411e530066912872d1e321562e7747aa40a5c75fa955e06391db6d2adaef98a76f42ff8dd5c61a
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5449766717:AAHzRorvKI5URgvleGHlq6ZvqElY68-XL18/sendMessage?chat_id=1293496579
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2448 set thread context of 3412 2448 SecuriteInfo.com.Variant.Barys.42241.11208.exe 83 PID 3412 set thread context of 2056 3412 MSBuild.exe 86 -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 20 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2448 SecuriteInfo.com.Variant.Barys.42241.11208.exe 2448 SecuriteInfo.com.Variant.Barys.42241.11208.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2448 SecuriteInfo.com.Variant.Barys.42241.11208.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3412 MSBuild.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2448 wrote to memory of 3412 2448 SecuriteInfo.com.Variant.Barys.42241.11208.exe 83 PID 2448 wrote to memory of 3412 2448 SecuriteInfo.com.Variant.Barys.42241.11208.exe 83 PID 2448 wrote to memory of 3412 2448 SecuriteInfo.com.Variant.Barys.42241.11208.exe 83 PID 2448 wrote to memory of 3412 2448 SecuriteInfo.com.Variant.Barys.42241.11208.exe 83 PID 2448 wrote to memory of 3412 2448 SecuriteInfo.com.Variant.Barys.42241.11208.exe 83 PID 2448 wrote to memory of 3412 2448 SecuriteInfo.com.Variant.Barys.42241.11208.exe 83 PID 2448 wrote to memory of 3412 2448 SecuriteInfo.com.Variant.Barys.42241.11208.exe 83 PID 2448 wrote to memory of 3412 2448 SecuriteInfo.com.Variant.Barys.42241.11208.exe 83 PID 3412 wrote to memory of 2056 3412 MSBuild.exe 86 PID 3412 wrote to memory of 2056 3412 MSBuild.exe 86 PID 3412 wrote to memory of 2056 3412 MSBuild.exe 86 PID 3412 wrote to memory of 2056 3412 MSBuild.exe 86 PID 3412 wrote to memory of 2056 3412 MSBuild.exe 86 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Barys.42241.11208.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Barys.42241.11208.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe3⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:2056
-
-