Analysis
-
max time kernel
69s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-08-2022 05:55
Static task
static1
Behavioral task
behavioral1
Sample
Offer Request.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Offer Request.exe
Resource
win10v2004-20220812-en
General
-
Target
Offer Request.exe
-
Size
901KB
-
MD5
795b1ccc977fe6edbb2e9b1d2c5d6759
-
SHA1
d9a9dd8d825468d4155051dff9eccfc395b40a02
-
SHA256
3402c28f8bb37b47cf2868b16ca9fd851f7004458a93c17802c04cf2064909eb
-
SHA512
78c657b5f4604299728751e9967e50de9411a1c6409e2ddd72d3f103deed585d52a8c85f4fec146356b5e000d35b7c994cfd7e9bc2c9c1710a1f1ac4c583899a
-
SSDEEP
24576:/7p4L8ggIzMcvCqpB2hhqle3KVLfBU9Cekog6:l4L8gR9Cqn2hhqleKL6i
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5450700540:AAEJyEEV8BKgYUKmnCPZxp19kD9GVSRup5M/sendMessage?chat_id=5422342474
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1664 set thread context of 1348 1664 Offer Request.exe 29 PID 1348 set thread context of 1160 1348 Offer Request.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1664 Offer Request.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1664 Offer Request.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1348 Offer Request.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1664 wrote to memory of 1376 1664 Offer Request.exe 28 PID 1664 wrote to memory of 1376 1664 Offer Request.exe 28 PID 1664 wrote to memory of 1376 1664 Offer Request.exe 28 PID 1664 wrote to memory of 1376 1664 Offer Request.exe 28 PID 1664 wrote to memory of 1348 1664 Offer Request.exe 29 PID 1664 wrote to memory of 1348 1664 Offer Request.exe 29 PID 1664 wrote to memory of 1348 1664 Offer Request.exe 29 PID 1664 wrote to memory of 1348 1664 Offer Request.exe 29 PID 1664 wrote to memory of 1348 1664 Offer Request.exe 29 PID 1664 wrote to memory of 1348 1664 Offer Request.exe 29 PID 1664 wrote to memory of 1348 1664 Offer Request.exe 29 PID 1664 wrote to memory of 1348 1664 Offer Request.exe 29 PID 1664 wrote to memory of 1348 1664 Offer Request.exe 29 PID 1348 wrote to memory of 1160 1348 Offer Request.exe 30 PID 1348 wrote to memory of 1160 1348 Offer Request.exe 30 PID 1348 wrote to memory of 1160 1348 Offer Request.exe 30 PID 1348 wrote to memory of 1160 1348 Offer Request.exe 30 PID 1348 wrote to memory of 1160 1348 Offer Request.exe 30 PID 1348 wrote to memory of 1160 1348 Offer Request.exe 30 PID 1348 wrote to memory of 1160 1348 Offer Request.exe 30 PID 1348 wrote to memory of 1160 1348 Offer Request.exe 30 PID 1348 wrote to memory of 1160 1348 Offer Request.exe 30 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Offer Request.exe"C:\Users\Admin\AppData\Local\Temp\Offer Request.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\Offer Request.exe"C:\Users\Admin\AppData\Local\Temp\Offer Request.exe"2⤵PID:1376
-
-
C:\Users\Admin\AppData\Local\Temp\Offer Request.exe"C:\Users\Admin\AppData\Local\Temp\Offer Request.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe3⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:1160
-
-