Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29-08-2022 05:55
Static task
static1
Behavioral task
behavioral1
Sample
Offer Request.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Offer Request.exe
Resource
win10v2004-20220812-en
General
-
Target
Offer Request.exe
-
Size
901KB
-
MD5
795b1ccc977fe6edbb2e9b1d2c5d6759
-
SHA1
d9a9dd8d825468d4155051dff9eccfc395b40a02
-
SHA256
3402c28f8bb37b47cf2868b16ca9fd851f7004458a93c17802c04cf2064909eb
-
SHA512
78c657b5f4604299728751e9967e50de9411a1c6409e2ddd72d3f103deed585d52a8c85f4fec146356b5e000d35b7c994cfd7e9bc2c9c1710a1f1ac4c583899a
-
SSDEEP
24576:/7p4L8ggIzMcvCqpB2hhqle3KVLfBU9Cekog6:l4L8gR9Cqn2hhqleKL6i
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5450700540:AAEJyEEV8BKgYUKmnCPZxp19kD9GVSRup5M/sendMessage?chat_id=5422342474
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1502147629-2175634256-330282290-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-1502147629-2175634256-330282290-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-1502147629-2175634256-330282290-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1520 set thread context of 4604 1520 Offer Request.exe 97 PID 4604 set thread context of 4020 4604 Offer Request.exe 99 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 62 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4604 Offer Request.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1520 wrote to memory of 4604 1520 Offer Request.exe 97 PID 1520 wrote to memory of 4604 1520 Offer Request.exe 97 PID 1520 wrote to memory of 4604 1520 Offer Request.exe 97 PID 1520 wrote to memory of 4604 1520 Offer Request.exe 97 PID 1520 wrote to memory of 4604 1520 Offer Request.exe 97 PID 1520 wrote to memory of 4604 1520 Offer Request.exe 97 PID 1520 wrote to memory of 4604 1520 Offer Request.exe 97 PID 1520 wrote to memory of 4604 1520 Offer Request.exe 97 PID 4604 wrote to memory of 4020 4604 Offer Request.exe 99 PID 4604 wrote to memory of 4020 4604 Offer Request.exe 99 PID 4604 wrote to memory of 4020 4604 Offer Request.exe 99 PID 4604 wrote to memory of 4020 4604 Offer Request.exe 99 PID 4604 wrote to memory of 4020 4604 Offer Request.exe 99 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1502147629-2175634256-330282290-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1502147629-2175634256-330282290-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Offer Request.exe"C:\Users\Admin\AppData\Local\Temp\Offer Request.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\Offer Request.exe"C:\Users\Admin\AppData\Local\Temp\Offer Request.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe3⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:4020
-
-