Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
16-01-2023 08:56
Static task
static1
Behavioral task
behavioral1
Sample
369f328fcd9ea57d880cbf4d770290b2134fe68a7091fdc27d5da7ec313198e6.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
369f328fcd9ea57d880cbf4d770290b2134fe68a7091fdc27d5da7ec313198e6.exe
Resource
win10v2004-20221111-en
General
-
Target
369f328fcd9ea57d880cbf4d770290b2134fe68a7091fdc27d5da7ec313198e6.exe
-
Size
602KB
-
MD5
f6462aa84dcd781e3ef0398d565d6f7b
-
SHA1
6b455aa36033be84072c6a353d39ee1fae4e6d41
-
SHA256
369f328fcd9ea57d880cbf4d770290b2134fe68a7091fdc27d5da7ec313198e6
-
SHA512
29420eeb155d40a0d86a1f5d2bd27bb708dd0f55d6c64cd79d0f6812744c8ab2b7d9493f32884cbe5a5fa960a90479a7c530dbbc01029e7af458ce3977bc0180
-
SSDEEP
12288:XfpX2ycT2qM5DF6OLMwSwC8TL5JPGgkd6RZ3HlhV1ygZ5F5RTz6o:sPM5EcM/kLb1O6R9lv4y58o
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5450700540:AAEJyEEV8BKgYUKmnCPZxp19kD9GVSRup5M/sendMessage?chat_id=5422342474
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Executes dropped EXE 3 IoCs
pid Process 4316 ddodzyr.exe 1268 ddodzyr.exe 2356 ddodzyr.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4316 set thread context of 2356 4316 ddodzyr.exe 84 PID 2356 set thread context of 2072 2356 ddodzyr.exe 85 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4316 ddodzyr.exe 4316 ddodzyr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2356 ddodzyr.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2276 wrote to memory of 4316 2276 369f328fcd9ea57d880cbf4d770290b2134fe68a7091fdc27d5da7ec313198e6.exe 82 PID 2276 wrote to memory of 4316 2276 369f328fcd9ea57d880cbf4d770290b2134fe68a7091fdc27d5da7ec313198e6.exe 82 PID 2276 wrote to memory of 4316 2276 369f328fcd9ea57d880cbf4d770290b2134fe68a7091fdc27d5da7ec313198e6.exe 82 PID 4316 wrote to memory of 1268 4316 ddodzyr.exe 83 PID 4316 wrote to memory of 1268 4316 ddodzyr.exe 83 PID 4316 wrote to memory of 1268 4316 ddodzyr.exe 83 PID 4316 wrote to memory of 2356 4316 ddodzyr.exe 84 PID 4316 wrote to memory of 2356 4316 ddodzyr.exe 84 PID 4316 wrote to memory of 2356 4316 ddodzyr.exe 84 PID 4316 wrote to memory of 2356 4316 ddodzyr.exe 84 PID 2356 wrote to memory of 2072 2356 ddodzyr.exe 85 PID 2356 wrote to memory of 2072 2356 ddodzyr.exe 85 PID 2356 wrote to memory of 2072 2356 ddodzyr.exe 85 PID 2356 wrote to memory of 2072 2356 ddodzyr.exe 85 PID 2356 wrote to memory of 2072 2356 ddodzyr.exe 85 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\369f328fcd9ea57d880cbf4d770290b2134fe68a7091fdc27d5da7ec313198e6.exe"C:\Users\Admin\AppData\Local\Temp\369f328fcd9ea57d880cbf4d770290b2134fe68a7091fdc27d5da7ec313198e6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\ddodzyr.exe"C:\Users\Admin\AppData\Local\Temp\ddodzyr.exe" C:\Users\Admin\AppData\Local\Temp\rlqcdznzw.mgb2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Users\Admin\AppData\Local\Temp\ddodzyr.exe"C:\Users\Admin\AppData\Local\Temp\ddodzyr.exe"3⤵
- Executes dropped EXE
PID:1268
-
-
C:\Users\Admin\AppData\Local\Temp\ddodzyr.exe"C:\Users\Admin\AppData\Local\Temp\ddodzyr.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe4⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:2072
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
440KB
MD516409cdbea87104a3d86627f79415b85
SHA1b998ce71b0c692e7510e830c599c15220fd8d887
SHA25692d0994004ead032d9452921e384e60bbd7ac760080735fab5e1bfa9263029ec
SHA5129f4ff6b3d589165be2b96408e2d68b3f1aa03fcafbb7205b9ca25818db31e533d78c6f2bdb75ee26246e2ed42a816cae2063db46039982564d983186de7c42c2
-
Filesize
301KB
MD540dbd118d6e4cf278a5dc43da80d4c15
SHA194090deb3113f79fcda0595b1eadea9626b89997
SHA256e059008867b855322e0b0d7abc72dc2c491004d3abb7c21c86fc5ef94d3262a0
SHA5122b3e232392fab18d24ac5e1a4e2affaee410abd4d39da258790b82d43e60b01142dd82e931d517912440768a3f6840048e80d77d7bc3a936f00eb3bc4218114e
-
Filesize
301KB
MD540dbd118d6e4cf278a5dc43da80d4c15
SHA194090deb3113f79fcda0595b1eadea9626b89997
SHA256e059008867b855322e0b0d7abc72dc2c491004d3abb7c21c86fc5ef94d3262a0
SHA5122b3e232392fab18d24ac5e1a4e2affaee410abd4d39da258790b82d43e60b01142dd82e931d517912440768a3f6840048e80d77d7bc3a936f00eb3bc4218114e
-
Filesize
301KB
MD540dbd118d6e4cf278a5dc43da80d4c15
SHA194090deb3113f79fcda0595b1eadea9626b89997
SHA256e059008867b855322e0b0d7abc72dc2c491004d3abb7c21c86fc5ef94d3262a0
SHA5122b3e232392fab18d24ac5e1a4e2affaee410abd4d39da258790b82d43e60b01142dd82e931d517912440768a3f6840048e80d77d7bc3a936f00eb3bc4218114e
-
Filesize
301KB
MD540dbd118d6e4cf278a5dc43da80d4c15
SHA194090deb3113f79fcda0595b1eadea9626b89997
SHA256e059008867b855322e0b0d7abc72dc2c491004d3abb7c21c86fc5ef94d3262a0
SHA5122b3e232392fab18d24ac5e1a4e2affaee410abd4d39da258790b82d43e60b01142dd82e931d517912440768a3f6840048e80d77d7bc3a936f00eb3bc4218114e
-
Filesize
5KB
MD53c7c968d021bc8382be39f8904214601
SHA1622969de48f54dcd71bc859c3174c1e5bfbd8d61
SHA2565f44022d88a213f3d3b863a0fc8761e5e135b50b0727a5b1782c5909f3426386
SHA5125357e4ad479f4402b8e4505863308c4574e5aab026a9d22933bb15319f203a2daa1a780da7e0e474c53e4a44fdd7a161b0db82d79189b512a258fbc5f6f6cdc1