Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2023 09:20
Static task
static1
Behavioral task
behavioral1
Sample
fatura643976,pdf.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
fatura643976,pdf.exe
Resource
win10v2004-20220812-en
General
-
Target
fatura643976,pdf.exe
-
Size
421KB
-
MD5
30caef35075e79f0a150e49e7fd665a9
-
SHA1
6cc67419a39d41ef1d98d7fc236470ef7b23a0ea
-
SHA256
6b3c502c1c7b53486fee54996d4c73905280fc76a897644b430d3c65a89ec381
-
SHA512
e4688addab4cdac3df8695cfecfb4719148dd14d04d0083645211a4180aea73e3d23484e63b8d2241d43318b49748dcb55906b057e5ef7e17483a2a60f26b931
-
SSDEEP
6144:OYa6whAp081nNxvOjqKoeKQFXrKr/mpn4AkpFxbn8HnOYoqDz3Y1e:OY26nvmjqKoebFGro4RpFWOTYzo1e
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5468731092:AAGGNQWBVRhX622u6xp1moMhaunIGtXuIxg/sendMessage?chat_id=1639214896
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral2/memory/2280-143-0x0000000000750000-0x000000000076A000-memory.dmp family_stormkitty -
Executes dropped EXE 2 IoCs
pid Process 4264 fmmkfwck.exe 1140 fmmkfwck.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gebcp = "C:\\Users\\Admin\\AppData\\Roaming\\osjl\\sojmp.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\fmmkfwck.exe\" C:\\Users\\Admin\\AppData\\Local\\Temp\\w" fmmkfwck.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 17 icanhazip.com -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4264 set thread context of 1140 4264 fmmkfwck.exe 80 PID 1140 set thread context of 2280 1140 fmmkfwck.exe 81 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 AppLaunch.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier AppLaunch.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4264 fmmkfwck.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2280 AppLaunch.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1140 fmmkfwck.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1800 wrote to memory of 4264 1800 fatura643976,pdf.exe 79 PID 1800 wrote to memory of 4264 1800 fatura643976,pdf.exe 79 PID 1800 wrote to memory of 4264 1800 fatura643976,pdf.exe 79 PID 4264 wrote to memory of 1140 4264 fmmkfwck.exe 80 PID 4264 wrote to memory of 1140 4264 fmmkfwck.exe 80 PID 4264 wrote to memory of 1140 4264 fmmkfwck.exe 80 PID 4264 wrote to memory of 1140 4264 fmmkfwck.exe 80 PID 1140 wrote to memory of 2280 1140 fmmkfwck.exe 81 PID 1140 wrote to memory of 2280 1140 fmmkfwck.exe 81 PID 1140 wrote to memory of 2280 1140 fmmkfwck.exe 81 PID 1140 wrote to memory of 2280 1140 fmmkfwck.exe 81 PID 1140 wrote to memory of 2280 1140 fmmkfwck.exe 81 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fatura643976,pdf.exe"C:\Users\Admin\AppData\Local\Temp\fatura643976,pdf.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\fmmkfwck.exe"C:\Users\Admin\AppData\Local\Temp\fmmkfwck.exe" C:\Users\Admin\AppData\Local\Temp\wsfatqze.qc2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Users\Admin\AppData\Local\Temp\fmmkfwck.exe"C:\Users\Admin\AppData\Local\Temp\fmmkfwck.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe4⤵
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2280
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD5ab5c3b78cc034b88e5289f11f977184e
SHA15b705c3fddcc792e99318ae94a77ddeb4f42ae87
SHA256c301c219333093b817496bdf4f0023c49414533855de0564a14261215654e348
SHA512fe56b4428ab35512bcda00d685dc37cd7c1c0abe4515c291ff4c906e9f8a6b45bb77b8ae45bddd8b400a84bd1271924763e6ec8d44a31f82134d1b0884bb66ad
-
Filesize
84KB
MD5ab5c3b78cc034b88e5289f11f977184e
SHA15b705c3fddcc792e99318ae94a77ddeb4f42ae87
SHA256c301c219333093b817496bdf4f0023c49414533855de0564a14261215654e348
SHA512fe56b4428ab35512bcda00d685dc37cd7c1c0abe4515c291ff4c906e9f8a6b45bb77b8ae45bddd8b400a84bd1271924763e6ec8d44a31f82134d1b0884bb66ad
-
Filesize
84KB
MD5ab5c3b78cc034b88e5289f11f977184e
SHA15b705c3fddcc792e99318ae94a77ddeb4f42ae87
SHA256c301c219333093b817496bdf4f0023c49414533855de0564a14261215654e348
SHA512fe56b4428ab35512bcda00d685dc37cd7c1c0abe4515c291ff4c906e9f8a6b45bb77b8ae45bddd8b400a84bd1271924763e6ec8d44a31f82134d1b0884bb66ad
-
Filesize
156KB
MD59ef9195ff8041d5d407493b229f4bacc
SHA11173c3debb17b75aeaf78d193a9fe61c4a270a50
SHA256c45f4233dab83b7abc75d9a17cecd7c4f189771772d09de695e85ecbd0428f5f
SHA5129b651e3832164da74265e86dbf0a2b3deb680bd6a15c7477c89fcba24e2942828f2661667aaabf802955b4a125d9190a87aac98084c427e203dedc4c9d86824c
-
Filesize
7KB
MD59895e54a683347ddd62483f8576618f5
SHA16130ca25510c9f0baf4357d2fcf07fb7dd709a24
SHA2563b3a94018fcdfc8333980691ab09e5e52304b5d114b8aafb7af837dcfd912358
SHA51261c7a910a3bfe91dd34010248ee905c530164df5316a3ed3454e467cbeb0f6901ac0fb49e16fe513916fc6222b26de01bd8983ac3fdf6c63970b97079a8442d9