Analysis
-
max time kernel
83s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
16-01-2023 09:25
Static task
static1
Behavioral task
behavioral1
Sample
hesaphareketi-02.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
hesaphareketi-02.exe
Resource
win10v2004-20221111-en
General
-
Target
hesaphareketi-02.exe
-
Size
286KB
-
MD5
020e8635c55df66681cd92163a811c7a
-
SHA1
21bf156059620f64f48b6a2e6564100108811dd2
-
SHA256
1ad0802a8ec7e2b02a912133947517e4b4b610426c5e278736e9de706956a97c
-
SHA512
3a737b8e6522af47ebeb29ea066bb89b520a86e6750762923aff52fb0430b9a6ba7724257e690cd6187e8d2a3079f0d6e4f8d78235363a842bc107e4f08fd457
-
SSDEEP
6144:WYa6NgSECqpOY00ZoaXPx9KYLENxmmz5g7oe29:WYbgQqpOY00zXPMW7U
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5468731092:AAGGNQWBVRhX622u6xp1moMhaunIGtXuIxg/sendMessage?chat_id=1639214896
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 4 IoCs
resource yara_rule behavioral1/memory/1416-71-0x00000000000D0000-0x00000000000EA000-memory.dmp family_stormkitty behavioral1/memory/1416-72-0x00000000000E4F6E-mapping.dmp family_stormkitty behavioral1/memory/1416-74-0x00000000000D0000-0x00000000000EA000-memory.dmp family_stormkitty behavioral1/memory/1416-76-0x00000000000D0000-0x00000000000EA000-memory.dmp family_stormkitty -
Executes dropped EXE 2 IoCs
pid Process 928 rirpsbo.exe 628 rirpsbo.exe -
Loads dropped DLL 3 IoCs
pid Process 1940 hesaphareketi-02.exe 1940 hesaphareketi-02.exe 928 rirpsbo.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\yqciwevsekycu = "C:\\Users\\Admin\\AppData\\Roaming\\ltybxsmfuowm\\btdc.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\rirpsbo.exe\" C:\\Users\\Admin\\AppData\\Local\\" rirpsbo.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 icanhazip.com -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 928 set thread context of 628 928 rirpsbo.exe 28 PID 628 set thread context of 1416 628 rirpsbo.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 AppLaunch.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier AppLaunch.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 928 rirpsbo.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1416 AppLaunch.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 628 rirpsbo.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1940 wrote to memory of 928 1940 hesaphareketi-02.exe 27 PID 1940 wrote to memory of 928 1940 hesaphareketi-02.exe 27 PID 1940 wrote to memory of 928 1940 hesaphareketi-02.exe 27 PID 1940 wrote to memory of 928 1940 hesaphareketi-02.exe 27 PID 928 wrote to memory of 628 928 rirpsbo.exe 28 PID 928 wrote to memory of 628 928 rirpsbo.exe 28 PID 928 wrote to memory of 628 928 rirpsbo.exe 28 PID 928 wrote to memory of 628 928 rirpsbo.exe 28 PID 928 wrote to memory of 628 928 rirpsbo.exe 28 PID 628 wrote to memory of 1416 628 rirpsbo.exe 29 PID 628 wrote to memory of 1416 628 rirpsbo.exe 29 PID 628 wrote to memory of 1416 628 rirpsbo.exe 29 PID 628 wrote to memory of 1416 628 rirpsbo.exe 29 PID 628 wrote to memory of 1416 628 rirpsbo.exe 29 PID 628 wrote to memory of 1416 628 rirpsbo.exe 29 PID 628 wrote to memory of 1416 628 rirpsbo.exe 29 PID 628 wrote to memory of 1416 628 rirpsbo.exe 29 PID 628 wrote to memory of 1416 628 rirpsbo.exe 29 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\hesaphareketi-02.exe"C:\Users\Admin\AppData\Local\Temp\hesaphareketi-02.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\rirpsbo.exe"C:\Users\Admin\AppData\Local\Temp\rirpsbo.exe" C:\Users\Admin\AppData\Local\Temp\hfjjyxtqyag.bxm2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Users\Admin\AppData\Local\Temp\rirpsbo.exe"C:\Users\Admin\AppData\Local\Temp\rirpsbo.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe4⤵
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1416
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD5aa27677343aa570535825c3cec2f1502
SHA1da331f227ea74b1f22816703bdb21cca319dc8a4
SHA256c04955cd1071e5cccd5ba567ec8c263e33cbce7e25f30392127411f1e12f0c16
SHA512467fe8258648c311c733f4067af4aacde93f5d7895e70be4a5c5915202e8bd49b6ca5521e50eef97f3aac849f543ca77ec722dbf7dba13ccecd3715c84cc5f23
-
Filesize
53KB
MD545093aa0671a150a5ba65e9c141a6769
SHA189c04a2ff8f849eb935c10880b70d332d111693e
SHA256a5cc03d5211a424e31074309dee6c708547941905a287d416e3462c861152cd0
SHA5120d3ae4f90dd0e1830dc8833d76501e41aedada4dbf899bdb682cb53556551e73d95344d208a23c096f0404d7a7d21939b4258ee4487b0a9c1d2e89715a773404
-
Filesize
53KB
MD545093aa0671a150a5ba65e9c141a6769
SHA189c04a2ff8f849eb935c10880b70d332d111693e
SHA256a5cc03d5211a424e31074309dee6c708547941905a287d416e3462c861152cd0
SHA5120d3ae4f90dd0e1830dc8833d76501e41aedada4dbf899bdb682cb53556551e73d95344d208a23c096f0404d7a7d21939b4258ee4487b0a9c1d2e89715a773404
-
Filesize
53KB
MD545093aa0671a150a5ba65e9c141a6769
SHA189c04a2ff8f849eb935c10880b70d332d111693e
SHA256a5cc03d5211a424e31074309dee6c708547941905a287d416e3462c861152cd0
SHA5120d3ae4f90dd0e1830dc8833d76501e41aedada4dbf899bdb682cb53556551e73d95344d208a23c096f0404d7a7d21939b4258ee4487b0a9c1d2e89715a773404
-
Filesize
156KB
MD5e7ec85d99291702c6eeddcafbb18d0f8
SHA1597940a25a8d2f38ee0315a6f68cc28a97b758a2
SHA2560f43f0deecff37062ca0b48bc7e1f2c2d0352e52946d6dd3def105d5d8e83948
SHA512a7393bc8e2b68a3b9ca8fd5e3b4830fc4bee109fdd4d3918544e3fbb1d8f67e2e9e67c300621414949ef19c865a8e1f0e542c9ff8dc1193e1061d0108bd28bbe
-
Filesize
53KB
MD545093aa0671a150a5ba65e9c141a6769
SHA189c04a2ff8f849eb935c10880b70d332d111693e
SHA256a5cc03d5211a424e31074309dee6c708547941905a287d416e3462c861152cd0
SHA5120d3ae4f90dd0e1830dc8833d76501e41aedada4dbf899bdb682cb53556551e73d95344d208a23c096f0404d7a7d21939b4258ee4487b0a9c1d2e89715a773404
-
Filesize
53KB
MD545093aa0671a150a5ba65e9c141a6769
SHA189c04a2ff8f849eb935c10880b70d332d111693e
SHA256a5cc03d5211a424e31074309dee6c708547941905a287d416e3462c861152cd0
SHA5120d3ae4f90dd0e1830dc8833d76501e41aedada4dbf899bdb682cb53556551e73d95344d208a23c096f0404d7a7d21939b4258ee4487b0a9c1d2e89715a773404
-
Filesize
53KB
MD545093aa0671a150a5ba65e9c141a6769
SHA189c04a2ff8f849eb935c10880b70d332d111693e
SHA256a5cc03d5211a424e31074309dee6c708547941905a287d416e3462c861152cd0
SHA5120d3ae4f90dd0e1830dc8833d76501e41aedada4dbf899bdb682cb53556551e73d95344d208a23c096f0404d7a7d21939b4258ee4487b0a9c1d2e89715a773404