Analysis
-
max time kernel
31s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
12-12-2022 08:46
Static task
static1
Behavioral task
behavioral1
Sample
price quote.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
price quote.exe
Resource
win10v2004-20220812-en
General
-
Target
price quote.exe
-
Size
574KB
-
MD5
985c89ebdec3c29ea7d3c37bc98984cf
-
SHA1
5bd5fcc00bce44d3276625f0683aafdfdf2c6a3a
-
SHA256
5460a91a459c049de389e20ce484875a26ce10a391701d2545f9fbed739bf3e5
-
SHA512
fcc617119e84a2616829b399daf2158dc0d9d07a60c741b27346296873b93f7edb717a6ec66bd44d919279bc396dfc645d8433c2fa6d2d4e0a920c0e2059f1cb
-
SSDEEP
12288:orp5mVfyKi7SymriIp6i2OFOeCNYj93778lZ/CKtxH3pOxbS:jVf5oSymriIpH2o5L7cZ6K7H3qS
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5806519032:AAFXvpc6Ywo24erqs91HjOs76SIn9mEqx8I/sendMessage?chat_id=5798400850
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Executes dropped EXE 2 IoCs
pid Process 1040 acksbden.exe 892 acksbden.exe -
Loads dropped DLL 3 IoCs
pid Process 1736 price quote.exe 1736 price quote.exe 1040 acksbden.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1040 set thread context of 892 1040 acksbden.exe 29 PID 892 set thread context of 1244 892 acksbden.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1040 acksbden.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 892 acksbden.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1736 wrote to memory of 1040 1736 price quote.exe 28 PID 1736 wrote to memory of 1040 1736 price quote.exe 28 PID 1736 wrote to memory of 1040 1736 price quote.exe 28 PID 1736 wrote to memory of 1040 1736 price quote.exe 28 PID 1040 wrote to memory of 892 1040 acksbden.exe 29 PID 1040 wrote to memory of 892 1040 acksbden.exe 29 PID 1040 wrote to memory of 892 1040 acksbden.exe 29 PID 1040 wrote to memory of 892 1040 acksbden.exe 29 PID 1040 wrote to memory of 892 1040 acksbden.exe 29 PID 892 wrote to memory of 1244 892 acksbden.exe 30 PID 892 wrote to memory of 1244 892 acksbden.exe 30 PID 892 wrote to memory of 1244 892 acksbden.exe 30 PID 892 wrote to memory of 1244 892 acksbden.exe 30 PID 892 wrote to memory of 1244 892 acksbden.exe 30 PID 892 wrote to memory of 1244 892 acksbden.exe 30 PID 892 wrote to memory of 1244 892 acksbden.exe 30 PID 892 wrote to memory of 1244 892 acksbden.exe 30 PID 892 wrote to memory of 1244 892 acksbden.exe 30 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\price quote.exe"C:\Users\Admin\AppData\Local\Temp\price quote.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\acksbden.exe"C:\Users\Admin\AppData\Local\Temp\acksbden.exe" C:\Users\Admin\AppData\Local\Temp\rzexvqaxlkk.l2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\acksbden.exe"C:\Users\Admin\AppData\Local\Temp\acksbden.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe4⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:1244
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
277KB
MD52e77164240e4e8a7eda940732e4fadc7
SHA1a277ebd8c377f4700600d88f9c6f88e279943a48
SHA256db574e25485aee48748cb789facedd0cb3080a7d5f376fccb60395238a5b9991
SHA5122e6dde8a64fbe10a340f10b8dbc57285cd6011e630a4e5e835cec8b130bf3c80c6ce6a03d54bfd2d5cf8071e01987f5115ff7d97d0c9e0f432ca8246be51dca9
-
Filesize
277KB
MD52e77164240e4e8a7eda940732e4fadc7
SHA1a277ebd8c377f4700600d88f9c6f88e279943a48
SHA256db574e25485aee48748cb789facedd0cb3080a7d5f376fccb60395238a5b9991
SHA5122e6dde8a64fbe10a340f10b8dbc57285cd6011e630a4e5e835cec8b130bf3c80c6ce6a03d54bfd2d5cf8071e01987f5115ff7d97d0c9e0f432ca8246be51dca9
-
Filesize
277KB
MD52e77164240e4e8a7eda940732e4fadc7
SHA1a277ebd8c377f4700600d88f9c6f88e279943a48
SHA256db574e25485aee48748cb789facedd0cb3080a7d5f376fccb60395238a5b9991
SHA5122e6dde8a64fbe10a340f10b8dbc57285cd6011e630a4e5e835cec8b130bf3c80c6ce6a03d54bfd2d5cf8071e01987f5115ff7d97d0c9e0f432ca8246be51dca9
-
Filesize
5KB
MD5a0cb93c5f07c907fad45b12e0cb465a7
SHA1190d6b0d00a5d782252fac5148ff0d60ea5407ea
SHA2569448c35ab44d0aadc349446e494b03e9640b56161e5d44574613d2cb8536c4d3
SHA5120cf46b9bb6e1febc3b172f4c8293b8da92a24dd97fe9275de8192f178d2726dcc12a844b95cb3977889c190ecc22a33b2ae71c6fc789dd388f6e67ea0385c5b5
-
Filesize
456KB
MD5f2b03e28713ce90f459111f736dd0886
SHA1300ff5137a1453fbe799ac5ed80680de3f589bf1
SHA256f06e1b71b2469c69d65db560370de82a7dcd002d24b717d868548f612e3cf6bb
SHA5124c695dbd068746f905cbbc49fe2b850209d9402c9e8b57f40cad103c71b8fed267f6fb774835f5c69e9e54458ed0792044e46628cdb044fcdc80e9c183001139
-
Filesize
277KB
MD52e77164240e4e8a7eda940732e4fadc7
SHA1a277ebd8c377f4700600d88f9c6f88e279943a48
SHA256db574e25485aee48748cb789facedd0cb3080a7d5f376fccb60395238a5b9991
SHA5122e6dde8a64fbe10a340f10b8dbc57285cd6011e630a4e5e835cec8b130bf3c80c6ce6a03d54bfd2d5cf8071e01987f5115ff7d97d0c9e0f432ca8246be51dca9
-
Filesize
277KB
MD52e77164240e4e8a7eda940732e4fadc7
SHA1a277ebd8c377f4700600d88f9c6f88e279943a48
SHA256db574e25485aee48748cb789facedd0cb3080a7d5f376fccb60395238a5b9991
SHA5122e6dde8a64fbe10a340f10b8dbc57285cd6011e630a4e5e835cec8b130bf3c80c6ce6a03d54bfd2d5cf8071e01987f5115ff7d97d0c9e0f432ca8246be51dca9
-
Filesize
277KB
MD52e77164240e4e8a7eda940732e4fadc7
SHA1a277ebd8c377f4700600d88f9c6f88e279943a48
SHA256db574e25485aee48748cb789facedd0cb3080a7d5f376fccb60395238a5b9991
SHA5122e6dde8a64fbe10a340f10b8dbc57285cd6011e630a4e5e835cec8b130bf3c80c6ce6a03d54bfd2d5cf8071e01987f5115ff7d97d0c9e0f432ca8246be51dca9