Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
18-10-2022 15:52
Static task
static1
Behavioral task
behavioral1
Sample
PROFORMA.EXE.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
PROFORMA.EXE.exe
Resource
win10v2004-20220812-en
General
-
Target
PROFORMA.EXE.exe
-
Size
1.3MB
-
MD5
fc5ab0fbd99f07685a8dc7701627f214
-
SHA1
e80e5a3d1450748736f035a7ee7856a4aacfeed9
-
SHA256
797ed9f4cabf70bcf98dbc50235bfacd785ca91a747febc965c92465a3d53283
-
SHA512
9f02188f31952a888f52c498d5ef23b1f35098e37d56cf65c26be5f91d2acf48315c8f5fa378bb5e7045e6a68e63812762beeca5736aba2099fb2a9983704e90
-
SSDEEP
24576:2xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxNussjTkuAHGe:VAm0THYewFdj
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5310184325:AAFI3fSQ6VcGu_NSTmv7d-qK2WCVhYY_qfg/sendMessage?chat_id=1293496579
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation PROFORMA.EXE.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4632 set thread context of 4400 4632 PROFORMA.EXE.exe 98 PID 4400 set thread context of 3044 4400 PROFORMA.EXE.exe 99 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3596 schtasks.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 37 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4632 PROFORMA.EXE.exe 4632 PROFORMA.EXE.exe 4632 PROFORMA.EXE.exe 4632 PROFORMA.EXE.exe 4632 PROFORMA.EXE.exe 4632 PROFORMA.EXE.exe 4632 PROFORMA.EXE.exe 4476 powershell.exe 4632 PROFORMA.EXE.exe 4476 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4632 PROFORMA.EXE.exe Token: SeDebugPrivilege 4476 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4400 PROFORMA.EXE.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 4632 wrote to memory of 4476 4632 PROFORMA.EXE.exe 91 PID 4632 wrote to memory of 4476 4632 PROFORMA.EXE.exe 91 PID 4632 wrote to memory of 4476 4632 PROFORMA.EXE.exe 91 PID 4632 wrote to memory of 3596 4632 PROFORMA.EXE.exe 93 PID 4632 wrote to memory of 3596 4632 PROFORMA.EXE.exe 93 PID 4632 wrote to memory of 3596 4632 PROFORMA.EXE.exe 93 PID 4632 wrote to memory of 4800 4632 PROFORMA.EXE.exe 95 PID 4632 wrote to memory of 4800 4632 PROFORMA.EXE.exe 95 PID 4632 wrote to memory of 4800 4632 PROFORMA.EXE.exe 95 PID 4632 wrote to memory of 5036 4632 PROFORMA.EXE.exe 97 PID 4632 wrote to memory of 5036 4632 PROFORMA.EXE.exe 97 PID 4632 wrote to memory of 5036 4632 PROFORMA.EXE.exe 97 PID 4632 wrote to memory of 1488 4632 PROFORMA.EXE.exe 96 PID 4632 wrote to memory of 1488 4632 PROFORMA.EXE.exe 96 PID 4632 wrote to memory of 1488 4632 PROFORMA.EXE.exe 96 PID 4632 wrote to memory of 4400 4632 PROFORMA.EXE.exe 98 PID 4632 wrote to memory of 4400 4632 PROFORMA.EXE.exe 98 PID 4632 wrote to memory of 4400 4632 PROFORMA.EXE.exe 98 PID 4632 wrote to memory of 4400 4632 PROFORMA.EXE.exe 98 PID 4632 wrote to memory of 4400 4632 PROFORMA.EXE.exe 98 PID 4632 wrote to memory of 4400 4632 PROFORMA.EXE.exe 98 PID 4632 wrote to memory of 4400 4632 PROFORMA.EXE.exe 98 PID 4632 wrote to memory of 4400 4632 PROFORMA.EXE.exe 98 PID 4400 wrote to memory of 3044 4400 PROFORMA.EXE.exe 99 PID 4400 wrote to memory of 3044 4400 PROFORMA.EXE.exe 99 PID 4400 wrote to memory of 3044 4400 PROFORMA.EXE.exe 99 PID 4400 wrote to memory of 3044 4400 PROFORMA.EXE.exe 99 PID 4400 wrote to memory of 3044 4400 PROFORMA.EXE.exe 99 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PROFORMA.EXE.exe"C:\Users\Admin\AppData\Local\Temp\PROFORMA.EXE.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\WXtEQNGzoNewfR.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4476
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WXtEQNGzoNewfR" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB6A.tmp"2⤵
- Creates scheduled task(s)
PID:3596
-
-
C:\Users\Admin\AppData\Local\Temp\PROFORMA.EXE.exe"C:\Users\Admin\AppData\Local\Temp\PROFORMA.EXE.exe"2⤵PID:4800
-
-
C:\Users\Admin\AppData\Local\Temp\PROFORMA.EXE.exe"C:\Users\Admin\AppData\Local\Temp\PROFORMA.EXE.exe"2⤵PID:1488
-
-
C:\Users\Admin\AppData\Local\Temp\PROFORMA.EXE.exe"C:\Users\Admin\AppData\Local\Temp\PROFORMA.EXE.exe"2⤵PID:5036
-
-
C:\Users\Admin\AppData\Local\Temp\PROFORMA.EXE.exe"C:\Users\Admin\AppData\Local\Temp\PROFORMA.EXE.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe3⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:3044
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD532dc15045f2baa94dac3e06656369d98
SHA166e627cff8fb4917ec8a8cdf19dff5949ee29c9f
SHA2560aac50863fb4528a7276041978b129edbcbf63f88397319d64593ff26276525f
SHA51218209621ceefcfd42025e8bbcb5105ce83b029efe37ffe1c7d33c228973796d4a8ffd19f220c89340631cd5da05a33ffec251a50a32daf41e8fb541591b64d85