Analysis
-
max time kernel
83s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
09-01-2023 18:18
Static task
static1
Behavioral task
behavioral1
Sample
fatura64383,pdf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fatura64383,pdf.exe
Resource
win10v2004-20220812-en
General
-
Target
fatura64383,pdf.exe
-
Size
366KB
-
MD5
ed637030ae7f20a8af6b08fc5401b2eb
-
SHA1
07d6ea65d57216d032a547cd41596f7f0d77fce6
-
SHA256
288a470426cff4110e23d8d2a531a19bae23149bba818a86e1e79341f10548d0
-
SHA512
c8b7216d4bfd486da62b54cb414bfd33e29304ef9d837306f01ecf36a116e2b101ab45424d1a9a7cff931947458de2dfd8af01ddcdc71b0fe89b10cc9baaf6e3
-
SSDEEP
6144:8Ya6hpFXx6WGu1PGgl95W9YBw1SrPK9a17TCd7FgibOJrdhEk:8YTpFXxLG6Gg09Yrr9f27vbOJd
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5732817033:AAFBYIIZmJ7NuvVwD7WRcbV9qwcOqT7RpwM/sendMessage?chat_id=1638137774
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1116-71-0x0000000000090000-0x00000000000AA000-memory.dmp family_stormkitty behavioral1/memory/1116-72-0x00000000000A4F6E-mapping.dmp family_stormkitty behavioral1/memory/1116-74-0x0000000000090000-0x00000000000AA000-memory.dmp family_stormkitty behavioral1/memory/1116-76-0x0000000000090000-0x00000000000AA000-memory.dmp family_stormkitty -
Executes dropped EXE 2 IoCs
Processes:
ajsmtz.exeajsmtz.exepid process 1484 ajsmtz.exe 1088 ajsmtz.exe -
Loads dropped DLL 3 IoCs
Processes:
fatura64383,pdf.exeajsmtz.exepid process 1728 fatura64383,pdf.exe 1728 fatura64383,pdf.exe 1484 ajsmtz.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
AppLaunch.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
ajsmtz.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\htyh = "C:\\Users\\Admin\\AppData\\Roaming\\rpjddpxyku\\vkmvrdifccmbs.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\ajsmtz.exe\" C:\\Users\\Admin\\AppData\\" ajsmtz.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 icanhazip.com -
Suspicious use of SetThreadContext 2 IoCs
Processes:
ajsmtz.exeajsmtz.exedescription pid process target process PID 1484 set thread context of 1088 1484 ajsmtz.exe ajsmtz.exe PID 1088 set thread context of 1116 1088 ajsmtz.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AppLaunch.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 AppLaunch.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier AppLaunch.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
ajsmtz.exepid process 1088 ajsmtz.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
ajsmtz.exepid process 1484 ajsmtz.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 1116 AppLaunch.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
ajsmtz.exepid process 1088 ajsmtz.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
fatura64383,pdf.exeajsmtz.exeajsmtz.exedescription pid process target process PID 1728 wrote to memory of 1484 1728 fatura64383,pdf.exe ajsmtz.exe PID 1728 wrote to memory of 1484 1728 fatura64383,pdf.exe ajsmtz.exe PID 1728 wrote to memory of 1484 1728 fatura64383,pdf.exe ajsmtz.exe PID 1728 wrote to memory of 1484 1728 fatura64383,pdf.exe ajsmtz.exe PID 1484 wrote to memory of 1088 1484 ajsmtz.exe ajsmtz.exe PID 1484 wrote to memory of 1088 1484 ajsmtz.exe ajsmtz.exe PID 1484 wrote to memory of 1088 1484 ajsmtz.exe ajsmtz.exe PID 1484 wrote to memory of 1088 1484 ajsmtz.exe ajsmtz.exe PID 1484 wrote to memory of 1088 1484 ajsmtz.exe ajsmtz.exe PID 1088 wrote to memory of 1116 1088 ajsmtz.exe AppLaunch.exe PID 1088 wrote to memory of 1116 1088 ajsmtz.exe AppLaunch.exe PID 1088 wrote to memory of 1116 1088 ajsmtz.exe AppLaunch.exe PID 1088 wrote to memory of 1116 1088 ajsmtz.exe AppLaunch.exe PID 1088 wrote to memory of 1116 1088 ajsmtz.exe AppLaunch.exe PID 1088 wrote to memory of 1116 1088 ajsmtz.exe AppLaunch.exe PID 1088 wrote to memory of 1116 1088 ajsmtz.exe AppLaunch.exe PID 1088 wrote to memory of 1116 1088 ajsmtz.exe AppLaunch.exe PID 1088 wrote to memory of 1116 1088 ajsmtz.exe AppLaunch.exe -
outlook_office_path 1 IoCs
Processes:
AppLaunch.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
Processes:
AppLaunch.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fatura64383,pdf.exe"C:\Users\Admin\AppData\Local\Temp\fatura64383,pdf.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ajsmtz.exe"C:\Users\Admin\AppData\Local\Temp\ajsmtz.exe" C:\Users\Admin\AppData\Local\Temp\xaovnyrryr.yh2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ajsmtz.exe"C:\Users\Admin\AppData\Local\Temp\ajsmtz.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe4⤵
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\ajsmtz.exeFilesize
57KB
MD51fa0e2a8c8dda67150e1491bb30bc81e
SHA1cd57df6dc0ce3d88d191662ce5edf8a9a7ce9930
SHA2569406c588ddedc001a2e75357643a1473729d9030e1cb82164da46456917eff7a
SHA5120f765bd1e76ce4a91291415ff357e23a42721a9e45e15e3ec0fdc6e48fbcfcb21b82d888da85313d9d3d5da7019ab6a2ed98ddbe1f85cce3238179652021ea50
-
C:\Users\Admin\AppData\Local\Temp\ajsmtz.exeFilesize
57KB
MD51fa0e2a8c8dda67150e1491bb30bc81e
SHA1cd57df6dc0ce3d88d191662ce5edf8a9a7ce9930
SHA2569406c588ddedc001a2e75357643a1473729d9030e1cb82164da46456917eff7a
SHA5120f765bd1e76ce4a91291415ff357e23a42721a9e45e15e3ec0fdc6e48fbcfcb21b82d888da85313d9d3d5da7019ab6a2ed98ddbe1f85cce3238179652021ea50
-
C:\Users\Admin\AppData\Local\Temp\ajsmtz.exeFilesize
57KB
MD51fa0e2a8c8dda67150e1491bb30bc81e
SHA1cd57df6dc0ce3d88d191662ce5edf8a9a7ce9930
SHA2569406c588ddedc001a2e75357643a1473729d9030e1cb82164da46456917eff7a
SHA5120f765bd1e76ce4a91291415ff357e23a42721a9e45e15e3ec0fdc6e48fbcfcb21b82d888da85313d9d3d5da7019ab6a2ed98ddbe1f85cce3238179652021ea50
-
C:\Users\Admin\AppData\Local\Temp\pcdxqcrrmin.puFilesize
164KB
MD5d35d05b93e1f06c2df8f6c9ef9e3605e
SHA1fd6a62e4e8e880c9512dcab86a6f802ab7af56ec
SHA256ff11a2e9a0a0ccabd79a00238aa0f26b55a2dae63dc8c68fd706ab7c408aa0c2
SHA512b7c9b7bf7dbcf8597e17d0680efe3f19eb7200526b749fbcbb3349575635e2666abeacee3d6d471ef23c6a31b1b63850054efc5429f1fdd8dc4d1023b2e65b61
-
C:\Users\Admin\AppData\Local\Temp\xaovnyrryr.yhFilesize
7KB
MD5b380734fee07e1f50b924f61ee13b959
SHA18128102b3cfe3d5510fe094a8c1460c9520f3fed
SHA2564f1daaddbf07bbbbe2fa84069f0856af3432bcc44fd49a30906800a2d2221e5e
SHA5120d163aa66b4949f311b8e550319029efa0f73c0576dace8e5f2bcd2051cede690324229e1fbf2970311cf881242ac497be94c19f6d2f763ac3b01f98fb41c0e9
-
\Users\Admin\AppData\Local\Temp\ajsmtz.exeFilesize
57KB
MD51fa0e2a8c8dda67150e1491bb30bc81e
SHA1cd57df6dc0ce3d88d191662ce5edf8a9a7ce9930
SHA2569406c588ddedc001a2e75357643a1473729d9030e1cb82164da46456917eff7a
SHA5120f765bd1e76ce4a91291415ff357e23a42721a9e45e15e3ec0fdc6e48fbcfcb21b82d888da85313d9d3d5da7019ab6a2ed98ddbe1f85cce3238179652021ea50
-
\Users\Admin\AppData\Local\Temp\ajsmtz.exeFilesize
57KB
MD51fa0e2a8c8dda67150e1491bb30bc81e
SHA1cd57df6dc0ce3d88d191662ce5edf8a9a7ce9930
SHA2569406c588ddedc001a2e75357643a1473729d9030e1cb82164da46456917eff7a
SHA5120f765bd1e76ce4a91291415ff357e23a42721a9e45e15e3ec0fdc6e48fbcfcb21b82d888da85313d9d3d5da7019ab6a2ed98ddbe1f85cce3238179652021ea50
-
\Users\Admin\AppData\Local\Temp\ajsmtz.exeFilesize
57KB
MD51fa0e2a8c8dda67150e1491bb30bc81e
SHA1cd57df6dc0ce3d88d191662ce5edf8a9a7ce9930
SHA2569406c588ddedc001a2e75357643a1473729d9030e1cb82164da46456917eff7a
SHA5120f765bd1e76ce4a91291415ff357e23a42721a9e45e15e3ec0fdc6e48fbcfcb21b82d888da85313d9d3d5da7019ab6a2ed98ddbe1f85cce3238179652021ea50
-
memory/1088-64-0x0000000000401D50-mapping.dmp
-
memory/1088-78-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/1088-79-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/1116-69-0x0000000000090000-0x00000000000AA000-memory.dmpFilesize
104KB
-
memory/1116-71-0x0000000000090000-0x00000000000AA000-memory.dmpFilesize
104KB
-
memory/1116-72-0x00000000000A4F6E-mapping.dmp
-
memory/1116-74-0x0000000000090000-0x00000000000AA000-memory.dmpFilesize
104KB
-
memory/1116-76-0x0000000000090000-0x00000000000AA000-memory.dmpFilesize
104KB
-
memory/1484-57-0x0000000000000000-mapping.dmp
-
memory/1728-54-0x0000000075DA1000-0x0000000075DA3000-memory.dmpFilesize
8KB