Analysis

  • max time kernel
    61s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    10/12/2022, 19:53 UTC

General

  • Target

    New Enquiry.exe

  • Size

    1.2MB

  • MD5

    db8113681e395345f71223c1d18e40c4

  • SHA1

    617ab388348ce4fa1bd203caa5558e570467db11

  • SHA256

    d794c27fbcf5de096750f2be32587d19cab1364b6fdd86318685574dedeb5af4

  • SHA512

    70302b571a40585a2776b8686fc9ac507456a317d1ab22dd6c43eba028d15ce2bef9bde0bf694d007869cb474c78b2706fc203f3608816819e9034ef76465b92

  • SSDEEP

    24576:JxqZRqOIRqOMub30RfQVipC2mdQSDGSDFBi/txagaLNAJ4iTiwAAgEEY4:J3z0aiplJSDji1xawiiTQp

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325

Signatures

  • BluStealer

    A Modular information stealer written in Visual Basic.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\New Enquiry.exe
    "C:\Users\Admin\AppData\Local\Temp\New Enquiry.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1168
    • C:\Users\Admin\AppData\Local\Temp\New Enquiry.exe
      "C:\Users\Admin\AppData\Local\Temp\New Enquiry.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:596
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        3⤵
        • Accesses Microsoft Outlook profiles
        • outlook_office_path
        • outlook_win_path
        PID:1292

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/596-61-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/596-82-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/596-68-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/596-65-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/596-63-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/596-60-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/1168-58-0x0000000008040000-0x000000000810C000-memory.dmp

    Filesize

    816KB

  • memory/1168-59-0x0000000008110000-0x00000000081A6000-memory.dmp

    Filesize

    600KB

  • memory/1168-54-0x0000000000DF0000-0x0000000000F32000-memory.dmp

    Filesize

    1.3MB

  • memory/1168-57-0x00000000003E0000-0x00000000003EE000-memory.dmp

    Filesize

    56KB

  • memory/1168-56-0x00000000002C0000-0x00000000002D6000-memory.dmp

    Filesize

    88KB

  • memory/1168-55-0x00000000760E1000-0x00000000760E3000-memory.dmp

    Filesize

    8KB

  • memory/1292-72-0x0000000000290000-0x00000000002F6000-memory.dmp

    Filesize

    408KB

  • memory/1292-74-0x0000000000290000-0x00000000002F6000-memory.dmp

    Filesize

    408KB

  • memory/1292-77-0x0000000000290000-0x00000000002F6000-memory.dmp

    Filesize

    408KB

  • memory/1292-79-0x0000000000290000-0x00000000002F6000-memory.dmp

    Filesize

    408KB

  • memory/1292-81-0x0000000004880000-0x000000000493C000-memory.dmp

    Filesize

    752KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.