Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-02-2023 15:11

General

  • Target

    Quotation Required.exe

  • Size

    501KB

  • MD5

    c6479e3bcb864d87e5d93ff06ed15c60

  • SHA1

    af08bbfe61178ee821e85b1f09be975b732387aa

  • SHA256

    9842d23cef4dc305ab6b8cd1ade477e1186d94cfd18861e1c87a55aff4d04c40

  • SHA512

    c5f4b4638b76b963fe8b731a08c43f67d5a8c512262755f78eca27feea5004e348e85a913926f8afe73accefa6a680bba37207adb37880100cd2f8ff6509b1b6

  • SSDEEP

    12288:/YmibSNNCgbjT5hg1s5PiA8C58tpxxqVTEp1B:/YmQoz5hgSN8tpxAVEp1B

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325

Signatures

  • BluStealer

    A Modular information stealer written in Visual Basic.

  • Executes dropped EXE 2 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Quotation Required.exe
    "C:\Users\Admin\AppData\Local\Temp\Quotation Required.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1660
    • C:\Users\Admin\AppData\Local\Temp\lhiecmmdg.exe
      "C:\Users\Admin\AppData\Local\Temp\lhiecmmdg.exe" C:\Users\Admin\AppData\Local\Temp\ovcnaiorxn.d
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:4956
      • C:\Users\Admin\AppData\Local\Temp\lhiecmmdg.exe
        "C:\Users\Admin\AppData\Local\Temp\lhiecmmdg.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4592
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          4⤵
          • Accesses Microsoft Outlook profiles
          • outlook_office_path
          • outlook_win_path
          PID:1400

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lhiecmmdg.exe

    Filesize

    54KB

    MD5

    208f168a8a01e2d071375e09c084dc5a

    SHA1

    e04b395d08bfad73c65997e24f4fb951a7837d61

    SHA256

    0ea519809172240457a3d0bdb4dce19d0456670355ff1ead6d9823a1e72e433b

    SHA512

    10f05cac53cc143ce0388e8cd3546e856ed245f3999aca51d2db1e2efeacfb7dc5a18192280ebcb4087208a9cd50e90612150712eeed2c68c5876741bfa940cc

  • C:\Users\Admin\AppData\Local\Temp\lhiecmmdg.exe

    Filesize

    54KB

    MD5

    208f168a8a01e2d071375e09c084dc5a

    SHA1

    e04b395d08bfad73c65997e24f4fb951a7837d61

    SHA256

    0ea519809172240457a3d0bdb4dce19d0456670355ff1ead6d9823a1e72e433b

    SHA512

    10f05cac53cc143ce0388e8cd3546e856ed245f3999aca51d2db1e2efeacfb7dc5a18192280ebcb4087208a9cd50e90612150712eeed2c68c5876741bfa940cc

  • C:\Users\Admin\AppData\Local\Temp\lhiecmmdg.exe

    Filesize

    54KB

    MD5

    208f168a8a01e2d071375e09c084dc5a

    SHA1

    e04b395d08bfad73c65997e24f4fb951a7837d61

    SHA256

    0ea519809172240457a3d0bdb4dce19d0456670355ff1ead6d9823a1e72e433b

    SHA512

    10f05cac53cc143ce0388e8cd3546e856ed245f3999aca51d2db1e2efeacfb7dc5a18192280ebcb4087208a9cd50e90612150712eeed2c68c5876741bfa940cc

  • C:\Users\Admin\AppData\Local\Temp\ovcnaiorxn.d

    Filesize

    5KB

    MD5

    162e0c2bbbccab38c10728759e5c96b7

    SHA1

    0f45df923464f98cc5f655af51f31f30646e164b

    SHA256

    8213a9356d16fc8d08625217bf8f5a95168bacf3dc1c0413820533f8a2aff10c

    SHA512

    0820e5ee0c3c2dacc596a8101a362ed53037c9560dc8b76d09db1798651cb1b09136e5438fb176cefb6fa81358bb3973a4ad05a2b61622453f5ed58beb17da20

  • C:\Users\Admin\AppData\Local\Temp\zeylacft.exz

    Filesize

    460KB

    MD5

    df3d012d61af20771fd15c9b906051fa

    SHA1

    2cd498b119af9cac981fd2a12e55224b8481f1ac

    SHA256

    a5c41dc9d73516047db56803ce3837afb830f990d01dd497494e24215a5597ac

    SHA512

    d27e5ad78d500d2300800a0b0d9302dd0dfeb367f2d1f983645c440950795fe883acab1c5056ddfc35e08d4ddf1f008ee3cc718e914a0e6b03d21fb475b09bc2

  • memory/1400-151-0x0000000000500000-0x0000000000566000-memory.dmp

    Filesize

    408KB

  • memory/1400-152-0x0000000004D10000-0x0000000004DAC000-memory.dmp

    Filesize

    624KB

  • memory/4592-166-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4592-174-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4592-145-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4592-142-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4592-154-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4592-177-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4592-167-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4592-168-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4592-169-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4592-170-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4592-171-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4592-172-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4592-173-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4592-149-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4592-175-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4592-176-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4956-141-0x0000000000460000-0x0000000000462000-memory.dmp

    Filesize

    8KB