Analysis
-
max time kernel
87s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
10-12-2022 04:19
Static task
static1
Behavioral task
behavioral1
Sample
quote request.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
quote request.exe
Resource
win10v2004-20220812-en
General
-
Target
quote request.exe
-
Size
756KB
-
MD5
6d4c80ae0bcc986dbd7439993ae10e54
-
SHA1
67ca4066cd527edc67c4d690d49c1a5eacd8119d
-
SHA256
b0b430c82cc574323d38d65365540472f3f0e6133dcb36e20ee9fcf5483769fa
-
SHA512
1ee0c13ad0c2deadfeadbf0e1af97a495c765ada125074a4845ff38fdf569e3f814562137b133089370311b46f80a8508ebd6173e8aa33b59bbedd312eb189a4
-
SSDEEP
12288:0Hklt3dwkiuzina39XGzuBPBWFmH4G+oipT3yzf0VO3yfg98tUNGmOev:LZqCinc9XiulBWQH4Roipa0VO32QyadJ
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5450700540:AAEJyEEV8BKgYUKmnCPZxp19kD9GVSRup5M/sendMessage?chat_id=5422342474
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 752 set thread context of 2012 752 quote request.exe 27 PID 2012 set thread context of 1648 2012 quote request.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2012 quote request.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 752 wrote to memory of 2012 752 quote request.exe 27 PID 752 wrote to memory of 2012 752 quote request.exe 27 PID 752 wrote to memory of 2012 752 quote request.exe 27 PID 752 wrote to memory of 2012 752 quote request.exe 27 PID 752 wrote to memory of 2012 752 quote request.exe 27 PID 752 wrote to memory of 2012 752 quote request.exe 27 PID 752 wrote to memory of 2012 752 quote request.exe 27 PID 752 wrote to memory of 2012 752 quote request.exe 27 PID 752 wrote to memory of 2012 752 quote request.exe 27 PID 2012 wrote to memory of 1648 2012 quote request.exe 28 PID 2012 wrote to memory of 1648 2012 quote request.exe 28 PID 2012 wrote to memory of 1648 2012 quote request.exe 28 PID 2012 wrote to memory of 1648 2012 quote request.exe 28 PID 2012 wrote to memory of 1648 2012 quote request.exe 28 PID 2012 wrote to memory of 1648 2012 quote request.exe 28 PID 2012 wrote to memory of 1648 2012 quote request.exe 28 PID 2012 wrote to memory of 1648 2012 quote request.exe 28 PID 2012 wrote to memory of 1648 2012 quote request.exe 28 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\quote request.exe"C:\Users\Admin\AppData\Local\Temp\quote request.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Users\Admin\AppData\Local\Temp\quote request.exe"C:\Users\Admin\AppData\Local\Temp\quote request.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe3⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:1648
-
-