Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
28-12-2022 15:53
Static task
static1
Behavioral task
behavioral1
Sample
Request for quotation.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Request for quotation.exe
Resource
win10v2004-20220812-en
General
-
Target
Request for quotation.exe
-
Size
504KB
-
MD5
3db74116bfd3320ecf106e9143260cea
-
SHA1
fa3b311a33b9f903f570494561c5c5a679d14808
-
SHA256
54ccc28b6adc020ce06f485e2e8d300b1871b52d55a280f2a06ec405dd9b5184
-
SHA512
a9210243e6679cffaf296f6e11a49ee75d80fe1b5400a38a2a18e5b17fc5b13680c4b00b9942130d281353b9c7265b96c3d22216eb1c21635ca22357018dfa05
-
SSDEEP
12288:3+Mp3mHUy1aI4LIvYfk9bADwcYHcSTWy3mE7v:/EHahfwADXS6y17v
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Executes dropped EXE 2 IoCs
pid Process 1712 knzhddpp.exe 956 knzhddpp.exe -
Loads dropped DLL 2 IoCs
pid Process 1836 Request for quotation.exe 1712 knzhddpp.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1712 set thread context of 956 1712 knzhddpp.exe 28 PID 956 set thread context of 1244 956 knzhddpp.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1712 knzhddpp.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 956 knzhddpp.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1836 wrote to memory of 1712 1836 Request for quotation.exe 27 PID 1836 wrote to memory of 1712 1836 Request for quotation.exe 27 PID 1836 wrote to memory of 1712 1836 Request for quotation.exe 27 PID 1836 wrote to memory of 1712 1836 Request for quotation.exe 27 PID 1712 wrote to memory of 956 1712 knzhddpp.exe 28 PID 1712 wrote to memory of 956 1712 knzhddpp.exe 28 PID 1712 wrote to memory of 956 1712 knzhddpp.exe 28 PID 1712 wrote to memory of 956 1712 knzhddpp.exe 28 PID 1712 wrote to memory of 956 1712 knzhddpp.exe 28 PID 956 wrote to memory of 1244 956 knzhddpp.exe 29 PID 956 wrote to memory of 1244 956 knzhddpp.exe 29 PID 956 wrote to memory of 1244 956 knzhddpp.exe 29 PID 956 wrote to memory of 1244 956 knzhddpp.exe 29 PID 956 wrote to memory of 1244 956 knzhddpp.exe 29 PID 956 wrote to memory of 1244 956 knzhddpp.exe 29 PID 956 wrote to memory of 1244 956 knzhddpp.exe 29 PID 956 wrote to memory of 1244 956 knzhddpp.exe 29 PID 956 wrote to memory of 1244 956 knzhddpp.exe 29 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Request for quotation.exe"C:\Users\Admin\AppData\Local\Temp\Request for quotation.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\knzhddpp.exe"C:\Users\Admin\AppData\Local\Temp\knzhddpp.exe" C:\Users\Admin\AppData\Local\Temp\epodusdsv.w2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\knzhddpp.exe"C:\Users\Admin\AppData\Local\Temp\knzhddpp.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe4⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:1244
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD563db17335228e9957674a96386aaf594
SHA1d5b80eaea459296d826f51da66224a1a71245ebf
SHA2565115219c17e22472e7beabcec42473f6664d298861392e8c9ade2bb4a5c993ad
SHA512c143ad2aac1e87d4af16adeebeda6621c02993040dcb027720e34ec68c565c804278a8c88f94a800d7254f0566a072a8c4124c5b1555fa226a7ec9b46011c01b
-
Filesize
140KB
MD5f4e41bb1555cac3a0e50c767bb33e3f4
SHA1d3fc5838cbfd19b0a87c4cf0d97e996f2f4bbb1f
SHA256a775f89f0096915619274272f644de6589ce4078fa965c3ed5a6bef2ca7fca99
SHA5120c4f28e1298307ab5c4b09445458760d95fc700c556e06eab9d3bab33036c93d57c46d97e66652f685ec6db198e7f7a87d3350632c34197644a990fe9838248f
-
Filesize
140KB
MD5f4e41bb1555cac3a0e50c767bb33e3f4
SHA1d3fc5838cbfd19b0a87c4cf0d97e996f2f4bbb1f
SHA256a775f89f0096915619274272f644de6589ce4078fa965c3ed5a6bef2ca7fca99
SHA5120c4f28e1298307ab5c4b09445458760d95fc700c556e06eab9d3bab33036c93d57c46d97e66652f685ec6db198e7f7a87d3350632c34197644a990fe9838248f
-
Filesize
140KB
MD5f4e41bb1555cac3a0e50c767bb33e3f4
SHA1d3fc5838cbfd19b0a87c4cf0d97e996f2f4bbb1f
SHA256a775f89f0096915619274272f644de6589ce4078fa965c3ed5a6bef2ca7fca99
SHA5120c4f28e1298307ab5c4b09445458760d95fc700c556e06eab9d3bab33036c93d57c46d97e66652f685ec6db198e7f7a87d3350632c34197644a990fe9838248f
-
Filesize
440KB
MD53c604d47b665956372a9c26cffb191a4
SHA1c0df794dbc2598fbb3653a3d9a266a320f1eb47e
SHA256074979ac8c77e9982622819203b25682a87df748323c5b9f50ce53fd59ba8ced
SHA51240fa74db61abb51db868563f9aa316fd0d04c4c5f18d1cefd11b155d74f50070faff3328ba911d159fb4603be4abe46456e414729f63e7b20938bf9ba4ea7771
-
Filesize
140KB
MD5f4e41bb1555cac3a0e50c767bb33e3f4
SHA1d3fc5838cbfd19b0a87c4cf0d97e996f2f4bbb1f
SHA256a775f89f0096915619274272f644de6589ce4078fa965c3ed5a6bef2ca7fca99
SHA5120c4f28e1298307ab5c4b09445458760d95fc700c556e06eab9d3bab33036c93d57c46d97e66652f685ec6db198e7f7a87d3350632c34197644a990fe9838248f
-
Filesize
140KB
MD5f4e41bb1555cac3a0e50c767bb33e3f4
SHA1d3fc5838cbfd19b0a87c4cf0d97e996f2f4bbb1f
SHA256a775f89f0096915619274272f644de6589ce4078fa965c3ed5a6bef2ca7fca99
SHA5120c4f28e1298307ab5c4b09445458760d95fc700c556e06eab9d3bab33036c93d57c46d97e66652f685ec6db198e7f7a87d3350632c34197644a990fe9838248f