Analysis
-
max time kernel
47s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
07-12-2022 19:08
Static task
static1
Behavioral task
behavioral1
Sample
RFQ# 437179.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
RFQ# 437179.exe
Resource
win10v2004-20220901-en
General
-
Target
RFQ# 437179.exe
-
Size
562KB
-
MD5
dded803ba4269da1756fc43235dfbcf0
-
SHA1
b33cbfc5cce9a52c20cb92521c13b0b2140d6ad8
-
SHA256
705a5f8f4299ced58dcbd2498becd1d5c53a9fa4ee6b84a457eef9f4113f5463
-
SHA512
37792b21f4d112286e38f7b17699d28f815c8c60c7b3ed2c3b366f2d6cfa8736d751be1a26ea8f367fc393b5ecf4f6653914b28c270017f322854aa21e2dd667
-
SSDEEP
12288:guarcBuv8Q7MHctIHPwvnZMoy12nyDNzazm5WANPRvYZJzmZLjm7cY:gfg9EMHhHQFyDR0EWCPVYZJzUPxY
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Executes dropped EXE 2 IoCs
pid Process 1780 fnpqojeedf.exe 1720 fnpqojeedf.exe -
Loads dropped DLL 2 IoCs
pid Process 1128 RFQ# 437179.exe 1780 fnpqojeedf.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1780 set thread context of 1720 1780 fnpqojeedf.exe 29 PID 1720 set thread context of 1072 1720 fnpqojeedf.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1780 fnpqojeedf.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1720 fnpqojeedf.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1128 wrote to memory of 1780 1128 RFQ# 437179.exe 27 PID 1128 wrote to memory of 1780 1128 RFQ# 437179.exe 27 PID 1128 wrote to memory of 1780 1128 RFQ# 437179.exe 27 PID 1128 wrote to memory of 1780 1128 RFQ# 437179.exe 27 PID 1780 wrote to memory of 1720 1780 fnpqojeedf.exe 29 PID 1780 wrote to memory of 1720 1780 fnpqojeedf.exe 29 PID 1780 wrote to memory of 1720 1780 fnpqojeedf.exe 29 PID 1780 wrote to memory of 1720 1780 fnpqojeedf.exe 29 PID 1780 wrote to memory of 1720 1780 fnpqojeedf.exe 29 PID 1720 wrote to memory of 1072 1720 fnpqojeedf.exe 30 PID 1720 wrote to memory of 1072 1720 fnpqojeedf.exe 30 PID 1720 wrote to memory of 1072 1720 fnpqojeedf.exe 30 PID 1720 wrote to memory of 1072 1720 fnpqojeedf.exe 30 PID 1720 wrote to memory of 1072 1720 fnpqojeedf.exe 30 PID 1720 wrote to memory of 1072 1720 fnpqojeedf.exe 30 PID 1720 wrote to memory of 1072 1720 fnpqojeedf.exe 30 PID 1720 wrote to memory of 1072 1720 fnpqojeedf.exe 30 PID 1720 wrote to memory of 1072 1720 fnpqojeedf.exe 30 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFQ# 437179.exe"C:\Users\Admin\AppData\Local\Temp\RFQ# 437179.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\fnpqojeedf.exe"C:\Users\Admin\AppData\Local\Temp\fnpqojeedf.exe" C:\Users\Admin\AppData\Local\Temp\tltkja.o2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\fnpqojeedf.exe"C:\Users\Admin\AppData\Local\Temp\fnpqojeedf.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe4⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:1072
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
267KB
MD5d3358b13e7fb7c125f3940df2d445ef5
SHA1d63264abfcc366467aee71c6771e6bd0e79258bb
SHA256411b14ca48d7bc96e76ad74b25aef8d35ce69cab385ee9d49cde0f9333ee9f2e
SHA512c5ecac1e91518fd2d3d088899289ea7832ba5484f8372f02e41c059124ea6f9207d11fd522e303b00ea2a78c3529c90696f7dbd4f37ed42cbdd79c9070cea742
-
Filesize
267KB
MD5d3358b13e7fb7c125f3940df2d445ef5
SHA1d63264abfcc366467aee71c6771e6bd0e79258bb
SHA256411b14ca48d7bc96e76ad74b25aef8d35ce69cab385ee9d49cde0f9333ee9f2e
SHA512c5ecac1e91518fd2d3d088899289ea7832ba5484f8372f02e41c059124ea6f9207d11fd522e303b00ea2a78c3529c90696f7dbd4f37ed42cbdd79c9070cea742
-
Filesize
267KB
MD5d3358b13e7fb7c125f3940df2d445ef5
SHA1d63264abfcc366467aee71c6771e6bd0e79258bb
SHA256411b14ca48d7bc96e76ad74b25aef8d35ce69cab385ee9d49cde0f9333ee9f2e
SHA512c5ecac1e91518fd2d3d088899289ea7832ba5484f8372f02e41c059124ea6f9207d11fd522e303b00ea2a78c3529c90696f7dbd4f37ed42cbdd79c9070cea742
-
Filesize
440KB
MD5ff1de85f4db373268a5cb25f636519a7
SHA100d253041f045e76d2d59b32818c0f3b240f56e4
SHA256da1b8039807e1766de8c4c4de00f6d44a1058e768654eef3a37cc44fa1b357bc
SHA512731f0506148d4108727da059f35ecc85920fdbdf0a961e61f7545b5701507cb816aa83733b28a802ebb81fcff9473e5405247f912572074ec6e466d6f86ee162
-
Filesize
5KB
MD545b85d88d4e24f0b8a9438b119dc0362
SHA1a5a47e35ef9f3ad813ad0b079af14285b29b787a
SHA2560c870ba371b3c285211631c2868db4fe06759b091de2dae16b698e95b91e2856
SHA5122da30edbfa26ad2c18e54eacbb51a4128ea9c2dbfda34bd905218da8de570ef7c53cff3947c573965b85f04e9a3eb6522bcea623a799f03a28d70b1f13bf7cb1
-
Filesize
267KB
MD5d3358b13e7fb7c125f3940df2d445ef5
SHA1d63264abfcc366467aee71c6771e6bd0e79258bb
SHA256411b14ca48d7bc96e76ad74b25aef8d35ce69cab385ee9d49cde0f9333ee9f2e
SHA512c5ecac1e91518fd2d3d088899289ea7832ba5484f8372f02e41c059124ea6f9207d11fd522e303b00ea2a78c3529c90696f7dbd4f37ed42cbdd79c9070cea742
-
Filesize
267KB
MD5d3358b13e7fb7c125f3940df2d445ef5
SHA1d63264abfcc366467aee71c6771e6bd0e79258bb
SHA256411b14ca48d7bc96e76ad74b25aef8d35ce69cab385ee9d49cde0f9333ee9f2e
SHA512c5ecac1e91518fd2d3d088899289ea7832ba5484f8372f02e41c059124ea6f9207d11fd522e303b00ea2a78c3529c90696f7dbd4f37ed42cbdd79c9070cea742