Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20220722-en -
resource tags
arch:x64arch:x86image:win10v2004-20220722-enlocale:en-usos:windows10-2004-x64system -
submitted
04-08-2022 13:48
Static task
static1
Behavioral task
behavioral1
Sample
792621a22b3db912726e2b70b953bd948b86ef6970f380e3f5151d87cd9a8cab.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
792621a22b3db912726e2b70b953bd948b86ef6970f380e3f5151d87cd9a8cab.exe
Resource
win10v2004-20220722-en
General
-
Target
792621a22b3db912726e2b70b953bd948b86ef6970f380e3f5151d87cd9a8cab.exe
-
Size
714KB
-
MD5
e565160ae6aa45409dd8c2963f802700
-
SHA1
54b3f0e549b36e2a8bb91fae7c8e697174655382
-
SHA256
792621a22b3db912726e2b70b953bd948b86ef6970f380e3f5151d87cd9a8cab
-
SHA512
0e1e9a7784b914271acee6613a0ff6a0674ac4229e46f8974f643cdb00bb58f9e3d1eb73f6b14806e68b2d18297e3224cdff7e16b35058acb9d684623775c1e2
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5424772161:AAH6VQSqwjXeoEOdtG4956oBr1sLrNy1vkE/sendMessage?chat_id=2053442539
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Loads dropped DLL 2 IoCs
pid Process 4256 cvtres.exe 4256 cvtres.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5032 set thread context of 4256 5032 792621a22b3db912726e2b70b953bd948b86ef6970f380e3f5151d87cd9a8cab.exe 88 PID 4256 set thread context of 328 4256 cvtres.exe 90 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4256 cvtres.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4256 cvtres.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 5032 wrote to memory of 4256 5032 792621a22b3db912726e2b70b953bd948b86ef6970f380e3f5151d87cd9a8cab.exe 88 PID 5032 wrote to memory of 4256 5032 792621a22b3db912726e2b70b953bd948b86ef6970f380e3f5151d87cd9a8cab.exe 88 PID 5032 wrote to memory of 4256 5032 792621a22b3db912726e2b70b953bd948b86ef6970f380e3f5151d87cd9a8cab.exe 88 PID 5032 wrote to memory of 4256 5032 792621a22b3db912726e2b70b953bd948b86ef6970f380e3f5151d87cd9a8cab.exe 88 PID 5032 wrote to memory of 4256 5032 792621a22b3db912726e2b70b953bd948b86ef6970f380e3f5151d87cd9a8cab.exe 88 PID 5032 wrote to memory of 4256 5032 792621a22b3db912726e2b70b953bd948b86ef6970f380e3f5151d87cd9a8cab.exe 88 PID 5032 wrote to memory of 4256 5032 792621a22b3db912726e2b70b953bd948b86ef6970f380e3f5151d87cd9a8cab.exe 88 PID 5032 wrote to memory of 4256 5032 792621a22b3db912726e2b70b953bd948b86ef6970f380e3f5151d87cd9a8cab.exe 88 PID 4256 wrote to memory of 328 4256 cvtres.exe 90 PID 4256 wrote to memory of 328 4256 cvtres.exe 90 PID 4256 wrote to memory of 328 4256 cvtres.exe 90 PID 4256 wrote to memory of 328 4256 cvtres.exe 90 PID 4256 wrote to memory of 328 4256 cvtres.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\792621a22b3db912726e2b70b953bd948b86ef6970f380e3f5151d87cd9a8cab.exe"C:\Users\Admin\AppData\Local\Temp\792621a22b3db912726e2b70b953bd948b86ef6970f380e3f5151d87cd9a8cab.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\InstallUtil.exe3⤵PID:328
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD5d77b227a28a78627c2323cac75948390
SHA1e228c3951f2a9fd0febfe07390633ab4f35727f4
SHA256527ec201dcd7695bd9830eb82ab35a3986121de9ea156193834aed9d79223b82
SHA5125627fbc8bbb98f644e21f101a68f0e0b07b87c264d00ea227286bed8ab6dd4ebf5114f03b632604f775ff93666a409a1a179a81ebfc9246956ba8150ff5b0587
-
Filesize
585KB
MD55405413fff79b8d9c747aa900f60f082
SHA171caf8907ddd9a3a25d71356bd2ce09bd293bd78
SHA2563e5a28ffde07ac661c26b6ccf94e64c1c90b1f25b3b24c90605aa922b87642eb
SHA5122f09a30fc4da5166bd665210fefa1d44ce344f0ec6a37f127d677aeb3ca4fc0d09b7c9c1540f57da1e3449b7f588a1c61115395e965fa153d4baa5033266ed66