Analysis
-
max time kernel
47s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
16-01-2023 08:56
Static task
static1
Behavioral task
behavioral1
Sample
369f328fcd9ea57d880cbf4d770290b2134fe68a7091fdc27d5da7ec313198e6.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
369f328fcd9ea57d880cbf4d770290b2134fe68a7091fdc27d5da7ec313198e6.exe
Resource
win10v2004-20221111-en
General
-
Target
369f328fcd9ea57d880cbf4d770290b2134fe68a7091fdc27d5da7ec313198e6.exe
-
Size
602KB
-
MD5
f6462aa84dcd781e3ef0398d565d6f7b
-
SHA1
6b455aa36033be84072c6a353d39ee1fae4e6d41
-
SHA256
369f328fcd9ea57d880cbf4d770290b2134fe68a7091fdc27d5da7ec313198e6
-
SHA512
29420eeb155d40a0d86a1f5d2bd27bb708dd0f55d6c64cd79d0f6812744c8ab2b7d9493f32884cbe5a5fa960a90479a7c530dbbc01029e7af458ce3977bc0180
-
SSDEEP
12288:XfpX2ycT2qM5DF6OLMwSwC8TL5JPGgkd6RZ3HlhV1ygZ5F5RTz6o:sPM5EcM/kLb1O6R9lv4y58o
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5450700540:AAEJyEEV8BKgYUKmnCPZxp19kD9GVSRup5M/sendMessage?chat_id=5422342474
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Executes dropped EXE 2 IoCs
pid Process 1992 ddodzyr.exe 280 ddodzyr.exe -
Loads dropped DLL 3 IoCs
pid Process 2016 369f328fcd9ea57d880cbf4d770290b2134fe68a7091fdc27d5da7ec313198e6.exe 2016 369f328fcd9ea57d880cbf4d770290b2134fe68a7091fdc27d5da7ec313198e6.exe 1992 ddodzyr.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1992 set thread context of 280 1992 ddodzyr.exe 28 PID 280 set thread context of 520 280 ddodzyr.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1992 ddodzyr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 280 ddodzyr.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2016 wrote to memory of 1992 2016 369f328fcd9ea57d880cbf4d770290b2134fe68a7091fdc27d5da7ec313198e6.exe 27 PID 2016 wrote to memory of 1992 2016 369f328fcd9ea57d880cbf4d770290b2134fe68a7091fdc27d5da7ec313198e6.exe 27 PID 2016 wrote to memory of 1992 2016 369f328fcd9ea57d880cbf4d770290b2134fe68a7091fdc27d5da7ec313198e6.exe 27 PID 2016 wrote to memory of 1992 2016 369f328fcd9ea57d880cbf4d770290b2134fe68a7091fdc27d5da7ec313198e6.exe 27 PID 1992 wrote to memory of 280 1992 ddodzyr.exe 28 PID 1992 wrote to memory of 280 1992 ddodzyr.exe 28 PID 1992 wrote to memory of 280 1992 ddodzyr.exe 28 PID 1992 wrote to memory of 280 1992 ddodzyr.exe 28 PID 1992 wrote to memory of 280 1992 ddodzyr.exe 28 PID 280 wrote to memory of 520 280 ddodzyr.exe 29 PID 280 wrote to memory of 520 280 ddodzyr.exe 29 PID 280 wrote to memory of 520 280 ddodzyr.exe 29 PID 280 wrote to memory of 520 280 ddodzyr.exe 29 PID 280 wrote to memory of 520 280 ddodzyr.exe 29 PID 280 wrote to memory of 520 280 ddodzyr.exe 29 PID 280 wrote to memory of 520 280 ddodzyr.exe 29 PID 280 wrote to memory of 520 280 ddodzyr.exe 29 PID 280 wrote to memory of 520 280 ddodzyr.exe 29 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\369f328fcd9ea57d880cbf4d770290b2134fe68a7091fdc27d5da7ec313198e6.exe"C:\Users\Admin\AppData\Local\Temp\369f328fcd9ea57d880cbf4d770290b2134fe68a7091fdc27d5da7ec313198e6.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\ddodzyr.exe"C:\Users\Admin\AppData\Local\Temp\ddodzyr.exe" C:\Users\Admin\AppData\Local\Temp\rlqcdznzw.mgb2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\ddodzyr.exe"C:\Users\Admin\AppData\Local\Temp\ddodzyr.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:280 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe4⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:520
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
440KB
MD516409cdbea87104a3d86627f79415b85
SHA1b998ce71b0c692e7510e830c599c15220fd8d887
SHA25692d0994004ead032d9452921e384e60bbd7ac760080735fab5e1bfa9263029ec
SHA5129f4ff6b3d589165be2b96408e2d68b3f1aa03fcafbb7205b9ca25818db31e533d78c6f2bdb75ee26246e2ed42a816cae2063db46039982564d983186de7c42c2
-
Filesize
301KB
MD540dbd118d6e4cf278a5dc43da80d4c15
SHA194090deb3113f79fcda0595b1eadea9626b89997
SHA256e059008867b855322e0b0d7abc72dc2c491004d3abb7c21c86fc5ef94d3262a0
SHA5122b3e232392fab18d24ac5e1a4e2affaee410abd4d39da258790b82d43e60b01142dd82e931d517912440768a3f6840048e80d77d7bc3a936f00eb3bc4218114e
-
Filesize
301KB
MD540dbd118d6e4cf278a5dc43da80d4c15
SHA194090deb3113f79fcda0595b1eadea9626b89997
SHA256e059008867b855322e0b0d7abc72dc2c491004d3abb7c21c86fc5ef94d3262a0
SHA5122b3e232392fab18d24ac5e1a4e2affaee410abd4d39da258790b82d43e60b01142dd82e931d517912440768a3f6840048e80d77d7bc3a936f00eb3bc4218114e
-
Filesize
301KB
MD540dbd118d6e4cf278a5dc43da80d4c15
SHA194090deb3113f79fcda0595b1eadea9626b89997
SHA256e059008867b855322e0b0d7abc72dc2c491004d3abb7c21c86fc5ef94d3262a0
SHA5122b3e232392fab18d24ac5e1a4e2affaee410abd4d39da258790b82d43e60b01142dd82e931d517912440768a3f6840048e80d77d7bc3a936f00eb3bc4218114e
-
Filesize
5KB
MD53c7c968d021bc8382be39f8904214601
SHA1622969de48f54dcd71bc859c3174c1e5bfbd8d61
SHA2565f44022d88a213f3d3b863a0fc8761e5e135b50b0727a5b1782c5909f3426386
SHA5125357e4ad479f4402b8e4505863308c4574e5aab026a9d22933bb15319f203a2daa1a780da7e0e474c53e4a44fdd7a161b0db82d79189b512a258fbc5f6f6cdc1
-
Filesize
301KB
MD540dbd118d6e4cf278a5dc43da80d4c15
SHA194090deb3113f79fcda0595b1eadea9626b89997
SHA256e059008867b855322e0b0d7abc72dc2c491004d3abb7c21c86fc5ef94d3262a0
SHA5122b3e232392fab18d24ac5e1a4e2affaee410abd4d39da258790b82d43e60b01142dd82e931d517912440768a3f6840048e80d77d7bc3a936f00eb3bc4218114e
-
Filesize
301KB
MD540dbd118d6e4cf278a5dc43da80d4c15
SHA194090deb3113f79fcda0595b1eadea9626b89997
SHA256e059008867b855322e0b0d7abc72dc2c491004d3abb7c21c86fc5ef94d3262a0
SHA5122b3e232392fab18d24ac5e1a4e2affaee410abd4d39da258790b82d43e60b01142dd82e931d517912440768a3f6840048e80d77d7bc3a936f00eb3bc4218114e
-
Filesize
301KB
MD540dbd118d6e4cf278a5dc43da80d4c15
SHA194090deb3113f79fcda0595b1eadea9626b89997
SHA256e059008867b855322e0b0d7abc72dc2c491004d3abb7c21c86fc5ef94d3262a0
SHA5122b3e232392fab18d24ac5e1a4e2affaee410abd4d39da258790b82d43e60b01142dd82e931d517912440768a3f6840048e80d77d7bc3a936f00eb3bc4218114e