Analysis
-
max time kernel
41s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
21-09-2022 06:17
Static task
static1
Behavioral task
behavioral1
Sample
b0e9448560ee599a965956a5efb0227b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b0e9448560ee599a965956a5efb0227b.exe
Resource
win10v2004-20220901-en
General
-
Target
b0e9448560ee599a965956a5efb0227b.exe
-
Size
278KB
-
MD5
b0e9448560ee599a965956a5efb0227b
-
SHA1
b5eb428385e2e3f47989b3c799e299766c64322a
-
SHA256
4d34911cc6d9d7b6f8eb4e43a384995af24479a2f7b9c902d26a584aeb460780
-
SHA512
173c469ae4c0bc88c5a57c65e78f970b1b1e04c35c671380df1b2f8c1fdb359b8772e1b5b9acde283f2af4e9fcb3dc7e25232c833da9982df7be2c017226de03
-
SSDEEP
3072:I54a/hIdKf8TfmRgq2QI39d7P3pjTvcEOgDX/hA45baARY5MtF9vdRzQKlfsB0Ni:cpudlTfLF5v1A4xav5YpdaKldfhfoq2
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5351997584:AAEyh4aj9rNp8tJtHYZqoYG-PSzq-z5M18M/sendMessage?chat_id=1374455932
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b0e9448560ee599a965956a5efb0227b.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b0e9448560ee599a965956a5efb0227b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b0e9448560ee599a965956a5efb0227b.exe -
resource yara_rule behavioral1/memory/1796-58-0x0000000000400000-0x0000000000AC1000-memory.dmp themida behavioral1/memory/1796-60-0x0000000000400000-0x0000000000AC1000-memory.dmp themida behavioral1/memory/1796-61-0x0000000000400000-0x0000000000AC1000-memory.dmp themida behavioral1/memory/1796-62-0x0000000000400000-0x0000000000AC1000-memory.dmp themida behavioral1/memory/1796-63-0x0000000000400000-0x0000000000AC1000-memory.dmp themida behavioral1/memory/1796-64-0x0000000000400000-0x0000000000AC1000-memory.dmp themida behavioral1/memory/1796-66-0x0000000000400000-0x0000000000AC1000-memory.dmp themida behavioral1/memory/1796-69-0x0000000000400000-0x0000000000AC1000-memory.dmp themida behavioral1/memory/1796-71-0x0000000000400000-0x0000000000AC1000-memory.dmp themida behavioral1/memory/1796-73-0x0000000000400000-0x0000000000AC1000-memory.dmp themida behavioral1/memory/1796-72-0x0000000000400000-0x0000000000AC1000-memory.dmp themida behavioral1/memory/1796-74-0x0000000000400000-0x0000000000AC1000-memory.dmp themida behavioral1/memory/1796-75-0x0000000000400000-0x0000000000AC1000-memory.dmp themida behavioral1/memory/1796-76-0x0000000000400000-0x0000000000AC1000-memory.dmp themida behavioral1/memory/1796-78-0x0000000000400000-0x0000000000AC1000-memory.dmp themida behavioral1/memory/1796-92-0x0000000000400000-0x0000000000AC1000-memory.dmp themida -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA b0e9448560ee599a965956a5efb0227b.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1796 b0e9448560ee599a965956a5efb0227b.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2024 set thread context of 1796 2024 b0e9448560ee599a965956a5efb0227b.exe 26 PID 1796 set thread context of 908 1796 b0e9448560ee599a965956a5efb0227b.exe 27 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2024 b0e9448560ee599a965956a5efb0227b.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1796 b0e9448560ee599a965956a5efb0227b.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2024 wrote to memory of 1796 2024 b0e9448560ee599a965956a5efb0227b.exe 26 PID 2024 wrote to memory of 1796 2024 b0e9448560ee599a965956a5efb0227b.exe 26 PID 2024 wrote to memory of 1796 2024 b0e9448560ee599a965956a5efb0227b.exe 26 PID 2024 wrote to memory of 1796 2024 b0e9448560ee599a965956a5efb0227b.exe 26 PID 2024 wrote to memory of 1796 2024 b0e9448560ee599a965956a5efb0227b.exe 26 PID 2024 wrote to memory of 1796 2024 b0e9448560ee599a965956a5efb0227b.exe 26 PID 2024 wrote to memory of 1796 2024 b0e9448560ee599a965956a5efb0227b.exe 26 PID 2024 wrote to memory of 1796 2024 b0e9448560ee599a965956a5efb0227b.exe 26 PID 2024 wrote to memory of 1796 2024 b0e9448560ee599a965956a5efb0227b.exe 26 PID 2024 wrote to memory of 1796 2024 b0e9448560ee599a965956a5efb0227b.exe 26 PID 2024 wrote to memory of 1796 2024 b0e9448560ee599a965956a5efb0227b.exe 26 PID 2024 wrote to memory of 1796 2024 b0e9448560ee599a965956a5efb0227b.exe 26 PID 1796 wrote to memory of 908 1796 b0e9448560ee599a965956a5efb0227b.exe 27 PID 1796 wrote to memory of 908 1796 b0e9448560ee599a965956a5efb0227b.exe 27 PID 1796 wrote to memory of 908 1796 b0e9448560ee599a965956a5efb0227b.exe 27 PID 1796 wrote to memory of 908 1796 b0e9448560ee599a965956a5efb0227b.exe 27 PID 1796 wrote to memory of 908 1796 b0e9448560ee599a965956a5efb0227b.exe 27 PID 1796 wrote to memory of 908 1796 b0e9448560ee599a965956a5efb0227b.exe 27 PID 1796 wrote to memory of 908 1796 b0e9448560ee599a965956a5efb0227b.exe 27 PID 1796 wrote to memory of 908 1796 b0e9448560ee599a965956a5efb0227b.exe 27 PID 1796 wrote to memory of 908 1796 b0e9448560ee599a965956a5efb0227b.exe 27 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0e9448560ee599a965956a5efb0227b.exe"C:\Users\Admin\AppData\Local\Temp\b0e9448560ee599a965956a5efb0227b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\b0e9448560ee599a965956a5efb0227b.exe"C:\Users\Admin\AppData\Local\Temp\b0e9448560ee599a965956a5efb0227b.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe3⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:908
-
-