Analysis
-
max time kernel
31s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
28-12-2022 03:54
Static task
static1
Behavioral task
behavioral1
Sample
Request for quotation.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Request for quotation.exe
Resource
win10v2004-20221111-en
General
-
Target
Request for quotation.exe
-
Size
561KB
-
MD5
e3572363055d9070ca4fd376822e6c7d
-
SHA1
9ea70096aa52e63a4c9a8cbf9ac762cd5bab4e3c
-
SHA256
5820d2d9198e0f6ac65879bf61d8e3d3018ddfef8c6d8ae62ac32b4b8e3201c8
-
SHA512
2129d7c8ea635f06e1ef420c07a6875d081ebbd9cc41fe025ebb041ee5f3608fb54fe4b8ea7cc841f6afc3c41512f6cc55bbb1504350e4d96df11ad01889c1a8
-
SSDEEP
12288:QWk9HkeZxrHKJOG23BSDLjy9wtLFaWuehkvTh0l5:BGkKxzKJOd3BSHjXFv010P
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Executes dropped EXE 2 IoCs
pid Process 1268 fqdyg.exe 944 fqdyg.exe -
Loads dropped DLL 3 IoCs
pid Process 1732 Request for quotation.exe 1732 Request for quotation.exe 1268 fqdyg.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1268 set thread context of 944 1268 fqdyg.exe 29 PID 944 set thread context of 540 944 fqdyg.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1268 fqdyg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 944 fqdyg.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1732 wrote to memory of 1268 1732 Request for quotation.exe 28 PID 1732 wrote to memory of 1268 1732 Request for quotation.exe 28 PID 1732 wrote to memory of 1268 1732 Request for quotation.exe 28 PID 1732 wrote to memory of 1268 1732 Request for quotation.exe 28 PID 1268 wrote to memory of 944 1268 fqdyg.exe 29 PID 1268 wrote to memory of 944 1268 fqdyg.exe 29 PID 1268 wrote to memory of 944 1268 fqdyg.exe 29 PID 1268 wrote to memory of 944 1268 fqdyg.exe 29 PID 1268 wrote to memory of 944 1268 fqdyg.exe 29 PID 944 wrote to memory of 540 944 fqdyg.exe 30 PID 944 wrote to memory of 540 944 fqdyg.exe 30 PID 944 wrote to memory of 540 944 fqdyg.exe 30 PID 944 wrote to memory of 540 944 fqdyg.exe 30 PID 944 wrote to memory of 540 944 fqdyg.exe 30 PID 944 wrote to memory of 540 944 fqdyg.exe 30 PID 944 wrote to memory of 540 944 fqdyg.exe 30 PID 944 wrote to memory of 540 944 fqdyg.exe 30 PID 944 wrote to memory of 540 944 fqdyg.exe 30 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Request for quotation.exe"C:\Users\Admin\AppData\Local\Temp\Request for quotation.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\fqdyg.exe"C:\Users\Admin\AppData\Local\Temp\fqdyg.exe" C:\Users\Admin\AppData\Local\Temp\crhikvp.g2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\fqdyg.exe"C:\Users\Admin\AppData\Local\Temp\fqdyg.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe4⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:540
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD595d4a83ee6fdc841e52ca7cc7282b346
SHA1ee78821f676035ae07a6d42505e2215fa9ad48e3
SHA25657af54fdd277f0895b194290e360e3ddf5dfd868737715e2ead51776d1a7c72e
SHA5121a0532bd80503110c3dfe2bf8ada9a2b58f9b657e9358dada6026743c76fa668426c82cee5c4a49262ec0646cc3da5235aee52056820ed5a23b078497355c982
-
Filesize
276KB
MD52db6841da65384789a619009aa217a2e
SHA114376e587cb259ada5e6a631890d959d82679546
SHA256ef06d0fc4dbe45f70381e4068d6cf12323af71fccf9b15eec3910af3bfe2a11e
SHA51296c858b3424ba806fe8e78f6e5f815123a3e320cd630572a79c6a3f117a509f7c6141e08f6800408b0198ca0b5de277937e51d7b8102fc54f3547e54a989c7d6
-
Filesize
276KB
MD52db6841da65384789a619009aa217a2e
SHA114376e587cb259ada5e6a631890d959d82679546
SHA256ef06d0fc4dbe45f70381e4068d6cf12323af71fccf9b15eec3910af3bfe2a11e
SHA51296c858b3424ba806fe8e78f6e5f815123a3e320cd630572a79c6a3f117a509f7c6141e08f6800408b0198ca0b5de277937e51d7b8102fc54f3547e54a989c7d6
-
Filesize
276KB
MD52db6841da65384789a619009aa217a2e
SHA114376e587cb259ada5e6a631890d959d82679546
SHA256ef06d0fc4dbe45f70381e4068d6cf12323af71fccf9b15eec3910af3bfe2a11e
SHA51296c858b3424ba806fe8e78f6e5f815123a3e320cd630572a79c6a3f117a509f7c6141e08f6800408b0198ca0b5de277937e51d7b8102fc54f3547e54a989c7d6
-
Filesize
440KB
MD50afddcba0c5fca89ce610775331426bb
SHA1c74680857ec6ab3695fbefbe3efb899f0af91781
SHA2562d71a51146bd9aae481aa0108c44b1337380bacab0f4d38a8efd4ba6e71bfe29
SHA5121b6a1732b1f045598553c6eff50f849955bb9e0302d7f81e311196862ff74081396866d0378c8febd95640d041827569c9214f0d8fc88764542920090a182bf9
-
Filesize
276KB
MD52db6841da65384789a619009aa217a2e
SHA114376e587cb259ada5e6a631890d959d82679546
SHA256ef06d0fc4dbe45f70381e4068d6cf12323af71fccf9b15eec3910af3bfe2a11e
SHA51296c858b3424ba806fe8e78f6e5f815123a3e320cd630572a79c6a3f117a509f7c6141e08f6800408b0198ca0b5de277937e51d7b8102fc54f3547e54a989c7d6
-
Filesize
276KB
MD52db6841da65384789a619009aa217a2e
SHA114376e587cb259ada5e6a631890d959d82679546
SHA256ef06d0fc4dbe45f70381e4068d6cf12323af71fccf9b15eec3910af3bfe2a11e
SHA51296c858b3424ba806fe8e78f6e5f815123a3e320cd630572a79c6a3f117a509f7c6141e08f6800408b0198ca0b5de277937e51d7b8102fc54f3547e54a989c7d6
-
Filesize
276KB
MD52db6841da65384789a619009aa217a2e
SHA114376e587cb259ada5e6a631890d959d82679546
SHA256ef06d0fc4dbe45f70381e4068d6cf12323af71fccf9b15eec3910af3bfe2a11e
SHA51296c858b3424ba806fe8e78f6e5f815123a3e320cd630572a79c6a3f117a509f7c6141e08f6800408b0198ca0b5de277937e51d7b8102fc54f3547e54a989c7d6