Analysis
-
max time kernel
36s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
09-12-2022 10:34
Static task
static1
Behavioral task
behavioral1
Sample
Request for quotation.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Request for quotation.exe
Resource
win10v2004-20220812-en
General
-
Target
Request for quotation.exe
-
Size
561KB
-
MD5
99bbaa54e597de53a3db66bb29fdbbc9
-
SHA1
ba9bf171acc6c2d7e897dc0a14515ff8e410d14a
-
SHA256
2a63a204abf0c8437b694e8b31e048a1c25bdebfae0cfda7e6e2bf469f74be1c
-
SHA512
7fd6b89ecda676aa7f664d6ec0ebb447ab5de5d95f30de247216355a37d16f6d8c1d68077876690da3df2fd9ea5803f5e6e64715da211e5f7d7a0bae3bfaaee2
-
SSDEEP
12288:2i3ArxsUjZytOBwImCTSuXz5S/FoDrXcGVf8kC9+Q1:2wArxsUZcORVpX9SMXPVf83
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Executes dropped EXE 2 IoCs
pid Process 860 zkijohgosn.exe 1492 zkijohgosn.exe -
Loads dropped DLL 3 IoCs
pid Process 1112 Request for quotation.exe 1112 Request for quotation.exe 860 zkijohgosn.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 860 set thread context of 1492 860 zkijohgosn.exe 27 PID 1492 set thread context of 1664 1492 zkijohgosn.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 860 zkijohgosn.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1492 zkijohgosn.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1112 wrote to memory of 860 1112 Request for quotation.exe 26 PID 1112 wrote to memory of 860 1112 Request for quotation.exe 26 PID 1112 wrote to memory of 860 1112 Request for quotation.exe 26 PID 1112 wrote to memory of 860 1112 Request for quotation.exe 26 PID 860 wrote to memory of 1492 860 zkijohgosn.exe 27 PID 860 wrote to memory of 1492 860 zkijohgosn.exe 27 PID 860 wrote to memory of 1492 860 zkijohgosn.exe 27 PID 860 wrote to memory of 1492 860 zkijohgosn.exe 27 PID 860 wrote to memory of 1492 860 zkijohgosn.exe 27 PID 1492 wrote to memory of 1664 1492 zkijohgosn.exe 28 PID 1492 wrote to memory of 1664 1492 zkijohgosn.exe 28 PID 1492 wrote to memory of 1664 1492 zkijohgosn.exe 28 PID 1492 wrote to memory of 1664 1492 zkijohgosn.exe 28 PID 1492 wrote to memory of 1664 1492 zkijohgosn.exe 28 PID 1492 wrote to memory of 1664 1492 zkijohgosn.exe 28 PID 1492 wrote to memory of 1664 1492 zkijohgosn.exe 28 PID 1492 wrote to memory of 1664 1492 zkijohgosn.exe 28 PID 1492 wrote to memory of 1664 1492 zkijohgosn.exe 28 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Request for quotation.exe"C:\Users\Admin\AppData\Local\Temp\Request for quotation.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\zkijohgosn.exe"C:\Users\Admin\AppData\Local\Temp\zkijohgosn.exe" C:\Users\Admin\AppData\Local\Temp\jrevgxst.ioj2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Users\Admin\AppData\Local\Temp\zkijohgosn.exe"C:\Users\Admin\AppData\Local\Temp\zkijohgosn.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe4⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:1664
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
440KB
MD580d01a7c918b10d10ae268e29c45588e
SHA15272b365e8593946a5b5d81cd61361198821aaef
SHA2562b6ebef92ad1872663f4096146d4bd03ebc048fa2d354173810247dfd1148f9a
SHA51267ea7893826261a14a248c1fbf6b89d6bfb570aed058f0958b2adda9ce09da97efd7a35ac757072817a33f837e7f2dff154c9d02000db2ad221eef00db44587b
-
Filesize
5KB
MD55b83826c5ebd10f449c49916b527d74c
SHA1671086f501b5b2d6daafc88e5d3c54aea875ba1a
SHA256a4d7b8b6278c40d53f6b0fae44512e84447eb4cb918d719c26084bc53c5e1471
SHA512f0fd17435f853dbc4cb2d1eccc98038ab9c4725eaf138d5e2a6f3c75a1870fa5d0af38c6dd28444cc59229930f0aaed308bde33e1670c9e7c48a88371ae8735f
-
Filesize
277KB
MD5dda34f4113e26505c51dd8ba718c92c9
SHA13cd29431be36fab6f96d4c264b15134840d2e7ef
SHA256fe21e115f63870ab636b98e30b7149bb7c1af3cb34fc20090d4fdd86c4d748e5
SHA512f20ade7e45ac833b7ace3208f6c0bf145d6fafd8a488c62760655bda2fc7ebe1007db02f01a66ad2295004274a4847643bec6cb7f8462df6b3604c1d095c69aa
-
Filesize
277KB
MD5dda34f4113e26505c51dd8ba718c92c9
SHA13cd29431be36fab6f96d4c264b15134840d2e7ef
SHA256fe21e115f63870ab636b98e30b7149bb7c1af3cb34fc20090d4fdd86c4d748e5
SHA512f20ade7e45ac833b7ace3208f6c0bf145d6fafd8a488c62760655bda2fc7ebe1007db02f01a66ad2295004274a4847643bec6cb7f8462df6b3604c1d095c69aa
-
Filesize
277KB
MD5dda34f4113e26505c51dd8ba718c92c9
SHA13cd29431be36fab6f96d4c264b15134840d2e7ef
SHA256fe21e115f63870ab636b98e30b7149bb7c1af3cb34fc20090d4fdd86c4d748e5
SHA512f20ade7e45ac833b7ace3208f6c0bf145d6fafd8a488c62760655bda2fc7ebe1007db02f01a66ad2295004274a4847643bec6cb7f8462df6b3604c1d095c69aa
-
Filesize
277KB
MD5dda34f4113e26505c51dd8ba718c92c9
SHA13cd29431be36fab6f96d4c264b15134840d2e7ef
SHA256fe21e115f63870ab636b98e30b7149bb7c1af3cb34fc20090d4fdd86c4d748e5
SHA512f20ade7e45ac833b7ace3208f6c0bf145d6fafd8a488c62760655bda2fc7ebe1007db02f01a66ad2295004274a4847643bec6cb7f8462df6b3604c1d095c69aa
-
Filesize
277KB
MD5dda34f4113e26505c51dd8ba718c92c9
SHA13cd29431be36fab6f96d4c264b15134840d2e7ef
SHA256fe21e115f63870ab636b98e30b7149bb7c1af3cb34fc20090d4fdd86c4d748e5
SHA512f20ade7e45ac833b7ace3208f6c0bf145d6fafd8a488c62760655bda2fc7ebe1007db02f01a66ad2295004274a4847643bec6cb7f8462df6b3604c1d095c69aa
-
Filesize
277KB
MD5dda34f4113e26505c51dd8ba718c92c9
SHA13cd29431be36fab6f96d4c264b15134840d2e7ef
SHA256fe21e115f63870ab636b98e30b7149bb7c1af3cb34fc20090d4fdd86c4d748e5
SHA512f20ade7e45ac833b7ace3208f6c0bf145d6fafd8a488c62760655bda2fc7ebe1007db02f01a66ad2295004274a4847643bec6cb7f8462df6b3604c1d095c69aa