Analysis
-
max time kernel
144s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
05-08-2022 05:52
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.MSIL.FormBook.IZFA.MTB.26806.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.MSIL.FormBook.IZFA.MTB.26806.exe
Resource
win10v2004-20220721-en
General
-
Target
SecuriteInfo.com.Trojan.MSIL.FormBook.IZFA.MTB.26806.exe
-
Size
2.3MB
-
MD5
c04e99a3f7c169773a1fec0d98be2d5f
-
SHA1
219b3cf5e69a2aef57f4565ec914652f8d285612
-
SHA256
3f38e461404e7085d3b0372b10dd26a7fc8397383afd51dc119705d003f3eade
-
SHA512
63b52ae3d38a6d5e5c6ec89fa5cc77c6924d7593f75c9a7454a5690a6c9b22fd9de8c650cd9a62c5454cf8d1a3abbec2ebe7ebf51b3177cc2e1d808f186f62a3
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5446953292:AAFkDq-HVam91vjV2SXkAWjbhfkBnxaPoa4/sendMessage?chat_id=1269002131
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2868 set thread context of 4988 2868 SecuriteInfo.com.Trojan.MSIL.FormBook.IZFA.MTB.26806.exe 86 PID 4988 set thread context of 4316 4988 MSBuild.exe 92 -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 38 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2868 SecuriteInfo.com.Trojan.MSIL.FormBook.IZFA.MTB.26806.exe 2868 SecuriteInfo.com.Trojan.MSIL.FormBook.IZFA.MTB.26806.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2868 SecuriteInfo.com.Trojan.MSIL.FormBook.IZFA.MTB.26806.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4988 MSBuild.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2868 wrote to memory of 4988 2868 SecuriteInfo.com.Trojan.MSIL.FormBook.IZFA.MTB.26806.exe 86 PID 2868 wrote to memory of 4988 2868 SecuriteInfo.com.Trojan.MSIL.FormBook.IZFA.MTB.26806.exe 86 PID 2868 wrote to memory of 4988 2868 SecuriteInfo.com.Trojan.MSIL.FormBook.IZFA.MTB.26806.exe 86 PID 2868 wrote to memory of 4988 2868 SecuriteInfo.com.Trojan.MSIL.FormBook.IZFA.MTB.26806.exe 86 PID 2868 wrote to memory of 4988 2868 SecuriteInfo.com.Trojan.MSIL.FormBook.IZFA.MTB.26806.exe 86 PID 2868 wrote to memory of 4988 2868 SecuriteInfo.com.Trojan.MSIL.FormBook.IZFA.MTB.26806.exe 86 PID 2868 wrote to memory of 4988 2868 SecuriteInfo.com.Trojan.MSIL.FormBook.IZFA.MTB.26806.exe 86 PID 2868 wrote to memory of 4988 2868 SecuriteInfo.com.Trojan.MSIL.FormBook.IZFA.MTB.26806.exe 86 PID 4988 wrote to memory of 4316 4988 MSBuild.exe 92 PID 4988 wrote to memory of 4316 4988 MSBuild.exe 92 PID 4988 wrote to memory of 4316 4988 MSBuild.exe 92 PID 4988 wrote to memory of 4316 4988 MSBuild.exe 92 PID 4988 wrote to memory of 4316 4988 MSBuild.exe 92 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.MSIL.FormBook.IZFA.MTB.26806.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.MSIL.FormBook.IZFA.MTB.26806.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe3⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:4316
-
-