Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06-10-2022 14:24
Static task
static1
Behavioral task
behavioral1
Sample
Technical specification.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Technical specification.exe
Resource
win10v2004-20220812-en
General
-
Target
Technical specification.exe
-
Size
1.2MB
-
MD5
31a29680b013c3d2928ada03074d0152
-
SHA1
25f08eaca9a1ba6b07f169d4a8095b1306d6342a
-
SHA256
42263e557ad50b22270aa78bc80360442bbb0475d12983e2bf760da7c3f6a3f6
-
SHA512
bb79319aa3b0191458d246fa83d4b84a65786cbfe14c2ab399dd22fd9aec65d680eaed2b0d24d44a0e419e79a5fb9a831fe282ec3aef7f17e2a4b6c72cb0f0fd
-
SSDEEP
24576:C74ve4hlhZ9JsMengztif/3uF5xOYZYaz0m:C4bvhiati33KTY20m
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5450700540:AAEJyEEV8BKgYUKmnCPZxp19kD9GVSRup5M/sendMessage?chat_id=5422342474
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2392 set thread context of 864 2392 Technical specification.exe 91 PID 864 set thread context of 3084 864 Technical specification.exe 92 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 39 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2392 Technical specification.exe 2392 Technical specification.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2392 Technical specification.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 864 Technical specification.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2392 wrote to memory of 1788 2392 Technical specification.exe 90 PID 2392 wrote to memory of 1788 2392 Technical specification.exe 90 PID 2392 wrote to memory of 1788 2392 Technical specification.exe 90 PID 2392 wrote to memory of 864 2392 Technical specification.exe 91 PID 2392 wrote to memory of 864 2392 Technical specification.exe 91 PID 2392 wrote to memory of 864 2392 Technical specification.exe 91 PID 2392 wrote to memory of 864 2392 Technical specification.exe 91 PID 2392 wrote to memory of 864 2392 Technical specification.exe 91 PID 2392 wrote to memory of 864 2392 Technical specification.exe 91 PID 2392 wrote to memory of 864 2392 Technical specification.exe 91 PID 2392 wrote to memory of 864 2392 Technical specification.exe 91 PID 864 wrote to memory of 3084 864 Technical specification.exe 92 PID 864 wrote to memory of 3084 864 Technical specification.exe 92 PID 864 wrote to memory of 3084 864 Technical specification.exe 92 PID 864 wrote to memory of 3084 864 Technical specification.exe 92 PID 864 wrote to memory of 3084 864 Technical specification.exe 92 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Technical specification.exe"C:\Users\Admin\AppData\Local\Temp\Technical specification.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\Technical specification.exe"C:\Users\Admin\AppData\Local\Temp\Technical specification.exe"2⤵PID:1788
-
-
C:\Users\Admin\AppData\Local\Temp\Technical specification.exe"C:\Users\Admin\AppData\Local\Temp\Technical specification.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe3⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:3084
-
-