Analysis
-
max time kernel
165s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2022 04:19
Static task
static1
Behavioral task
behavioral1
Sample
quote request.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
quote request.exe
Resource
win10v2004-20220812-en
General
-
Target
quote request.exe
-
Size
756KB
-
MD5
6d4c80ae0bcc986dbd7439993ae10e54
-
SHA1
67ca4066cd527edc67c4d690d49c1a5eacd8119d
-
SHA256
b0b430c82cc574323d38d65365540472f3f0e6133dcb36e20ee9fcf5483769fa
-
SHA512
1ee0c13ad0c2deadfeadbf0e1af97a495c765ada125074a4845ff38fdf569e3f814562137b133089370311b46f80a8508ebd6173e8aa33b59bbedd312eb189a4
-
SSDEEP
12288:0Hklt3dwkiuzina39XGzuBPBWFmH4G+oipT3yzf0VO3yfg98tUNGmOev:LZqCinc9XiulBWQH4Roipa0VO32QyadJ
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5450700540:AAEJyEEV8BKgYUKmnCPZxp19kD9GVSRup5M/sendMessage?chat_id=5422342474
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3440 set thread context of 4888 3440 quote request.exe 83 PID 4888 set thread context of 1256 4888 quote request.exe 84 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3440 quote request.exe 3440 quote request.exe 3440 quote request.exe 3440 quote request.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3440 quote request.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4888 quote request.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 3440 wrote to memory of 4932 3440 quote request.exe 81 PID 3440 wrote to memory of 4932 3440 quote request.exe 81 PID 3440 wrote to memory of 4932 3440 quote request.exe 81 PID 3440 wrote to memory of 4848 3440 quote request.exe 82 PID 3440 wrote to memory of 4848 3440 quote request.exe 82 PID 3440 wrote to memory of 4848 3440 quote request.exe 82 PID 3440 wrote to memory of 4888 3440 quote request.exe 83 PID 3440 wrote to memory of 4888 3440 quote request.exe 83 PID 3440 wrote to memory of 4888 3440 quote request.exe 83 PID 3440 wrote to memory of 4888 3440 quote request.exe 83 PID 3440 wrote to memory of 4888 3440 quote request.exe 83 PID 3440 wrote to memory of 4888 3440 quote request.exe 83 PID 3440 wrote to memory of 4888 3440 quote request.exe 83 PID 3440 wrote to memory of 4888 3440 quote request.exe 83 PID 4888 wrote to memory of 1256 4888 quote request.exe 84 PID 4888 wrote to memory of 1256 4888 quote request.exe 84 PID 4888 wrote to memory of 1256 4888 quote request.exe 84 PID 4888 wrote to memory of 1256 4888 quote request.exe 84 PID 4888 wrote to memory of 1256 4888 quote request.exe 84 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\quote request.exe"C:\Users\Admin\AppData\Local\Temp\quote request.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\quote request.exe"C:\Users\Admin\AppData\Local\Temp\quote request.exe"2⤵PID:4932
-
-
C:\Users\Admin\AppData\Local\Temp\quote request.exe"C:\Users\Admin\AppData\Local\Temp\quote request.exe"2⤵PID:4848
-
-
C:\Users\Admin\AppData\Local\Temp\quote request.exe"C:\Users\Admin\AppData\Local\Temp\quote request.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe3⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:1256
-
-