Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2022 15:47
Behavioral task
behavioral1
Sample
49b3b273bcde3ffa77230bca6036ddd1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
49b3b273bcde3ffa77230bca6036ddd1.exe
Resource
win10v2004-20220901-en
General
-
Target
49b3b273bcde3ffa77230bca6036ddd1.exe
-
Size
2.8MB
-
MD5
49b3b273bcde3ffa77230bca6036ddd1
-
SHA1
e25fdf251f5ac4ffad2836ddcfbbd9efb5a1adba
-
SHA256
4edfbba77374d0a3d2a422b91fe68b169b714e18f0574f8a2480db5ef60133af
-
SHA512
f47eedfa329214a35f79da74334937c849071e8843ce551a63eab391dc0982424df94e2d881b1c7e5cba70b65c1aa8bc67a8278ce23e95c716654b84dd3cd3cb
-
SSDEEP
49152:7OJGLUpIRkdAI0B4VQZ3vZdhYwb8ixoQsoyx8Unug+QPZ7/g5PMYD3lE+TjhARFF:7SGbGdAQV4R0wizugbdgLD3DhARFwm
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5351997584:AAEyh4aj9rNp8tJtHYZqoYG-PSzq-z5M18M/sendMessage?chat_id=1374455932
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 49b3b273bcde3ffa77230bca6036ddd1.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 49b3b273bcde3ffa77230bca6036ddd1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 49b3b273bcde3ffa77230bca6036ddd1.exe -
resource yara_rule behavioral2/memory/2976-132-0x0000000000400000-0x0000000000AC1000-memory.dmp themida behavioral2/memory/2976-133-0x0000000000400000-0x0000000000AC1000-memory.dmp themida behavioral2/memory/2976-138-0x0000000000400000-0x0000000000AC1000-memory.dmp themida -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 49b3b273bcde3ffa77230bca6036ddd1.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2976 49b3b273bcde3ffa77230bca6036ddd1.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2976 set thread context of 2364 2976 49b3b273bcde3ffa77230bca6036ddd1.exe 96 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 38 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2976 49b3b273bcde3ffa77230bca6036ddd1.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2976 wrote to memory of 2364 2976 49b3b273bcde3ffa77230bca6036ddd1.exe 96 PID 2976 wrote to memory of 2364 2976 49b3b273bcde3ffa77230bca6036ddd1.exe 96 PID 2976 wrote to memory of 2364 2976 49b3b273bcde3ffa77230bca6036ddd1.exe 96 PID 2976 wrote to memory of 2364 2976 49b3b273bcde3ffa77230bca6036ddd1.exe 96 PID 2976 wrote to memory of 2364 2976 49b3b273bcde3ffa77230bca6036ddd1.exe 96 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\49b3b273bcde3ffa77230bca6036ddd1.exe"C:\Users\Admin\AppData\Local\Temp\49b3b273bcde3ffa77230bca6036ddd1.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe2⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:2364
-