Analysis

  • max time kernel
    146s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-02-2023 17:40

General

  • Target

    PO 152421.exe

  • Size

    501KB

  • MD5

    460bdbbe5a6b8bd3f887c8b6fd4128a2

  • SHA1

    891099bcbf82de10e1b197d2c42b2044dc0bed46

  • SHA256

    58d5286e5694f883d2452a81e5f6e77413292ba388300a6e44dd0f91e217aff1

  • SHA512

    b741e4bc33762adc9dee71f7a348ec9e7615bd4631bb73c39e4d69a01e8d469a3eb1aa303c691e2671aa939c223c6fc4a5bc05b2dea23b40f3e5422e2b4b3c6c

  • SSDEEP

    12288:/YFfpyLOuydXBmm+vie9mUX1NqRBchWc6P0vMLxJRg0ExsOPn7jhPhl9iqo+/:/YFhyCuCoie9nFNqgL6P0vlLxVP7FT93

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5450700540:AAEJyEEV8BKgYUKmnCPZxp19kD9GVSRup5M/sendMessage?chat_id=5422342474

Signatures

  • BluStealer

    A Modular information stealer written in Visual Basic.

  • Executes dropped EXE 2 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PO 152421.exe
    "C:\Users\Admin\AppData\Local\Temp\PO 152421.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4968
    • C:\Users\Admin\AppData\Local\Temp\zabwn.exe
      "C:\Users\Admin\AppData\Local\Temp\zabwn.exe" C:\Users\Admin\AppData\Local\Temp\mcyherebmfy.ki
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:4752
      • C:\Users\Admin\AppData\Local\Temp\zabwn.exe
        "C:\Users\Admin\AppData\Local\Temp\zabwn.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4608
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          4⤵
          • Accesses Microsoft Outlook profiles
          • outlook_office_path
          • outlook_win_path
          PID:4980

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\dvdgluqjpl.lu

    Filesize

    460KB

    MD5

    8a6178215aecfc693a8c1ed6b603c9ed

    SHA1

    48c3dcdd96aaf16f6b23678730659ecffb608800

    SHA256

    79e70faf30babd56571cb125d18aeeb004cd672e7564f982cd266635921a8540

    SHA512

    4615144dd37bcb20e3668ac317d3ef49495fe3d83d237ff85297b638c7231c0021d75ed50bfc195406d886ebd4098efb5a2b4847eceaa8dc1370834657fcc36c

  • C:\Users\Admin\AppData\Local\Temp\mcyherebmfy.ki

    Filesize

    5KB

    MD5

    4f7e253adbf25df53a7a3f74981cf3c0

    SHA1

    a4ac4ee5bfa12232dc7e5eaae5bbbd3be42f9831

    SHA256

    e37eee65e86f850c12436f581065ae185612e30ed4fbe9ae4cf4e9c9d6e65fa0

    SHA512

    7a0839e7daff273466e7a3e411f2aebe2c57ecb80a10246ea091dacda2dc67e30b0c30c93571a6ea870a057f726de1c10845c2307ee121b2d23c9ecf3ae258c6

  • C:\Users\Admin\AppData\Local\Temp\zabwn.exe

    Filesize

    54KB

    MD5

    62b62b17b3e2090607d52c9fb1fd304a

    SHA1

    9b52577f421ed09935b71b8d4dee2b38276f6b64

    SHA256

    e331eecc8dd8dc9ef2352e5bf24948f7f763a5785f6f778d292b30ecf1fc695b

    SHA512

    a51c60a8d5ed4acf96c73000d971e6b8f00ff7021f5263b508dc89d089d71e1a7ab974f23228cb713ced638088021b878891f39cf094ce5f6438b2a416ba2ec0

  • C:\Users\Admin\AppData\Local\Temp\zabwn.exe

    Filesize

    54KB

    MD5

    62b62b17b3e2090607d52c9fb1fd304a

    SHA1

    9b52577f421ed09935b71b8d4dee2b38276f6b64

    SHA256

    e331eecc8dd8dc9ef2352e5bf24948f7f763a5785f6f778d292b30ecf1fc695b

    SHA512

    a51c60a8d5ed4acf96c73000d971e6b8f00ff7021f5263b508dc89d089d71e1a7ab974f23228cb713ced638088021b878891f39cf094ce5f6438b2a416ba2ec0

  • C:\Users\Admin\AppData\Local\Temp\zabwn.exe

    Filesize

    54KB

    MD5

    62b62b17b3e2090607d52c9fb1fd304a

    SHA1

    9b52577f421ed09935b71b8d4dee2b38276f6b64

    SHA256

    e331eecc8dd8dc9ef2352e5bf24948f7f763a5785f6f778d292b30ecf1fc695b

    SHA512

    a51c60a8d5ed4acf96c73000d971e6b8f00ff7021f5263b508dc89d089d71e1a7ab974f23228cb713ced638088021b878891f39cf094ce5f6438b2a416ba2ec0

  • memory/4608-154-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4608-174-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4608-146-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4608-149-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4608-178-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4608-177-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4608-176-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4608-175-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4608-166-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4608-167-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4608-168-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4608-169-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4608-170-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4608-171-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4608-172-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4608-173-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4608-142-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4752-141-0x0000000000570000-0x0000000000572000-memory.dmp

    Filesize

    8KB

  • memory/4980-152-0x0000000004F30000-0x0000000004FCC000-memory.dmp

    Filesize

    624KB

  • memory/4980-151-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

    Filesize

    64KB

  • memory/4980-150-0x0000000000780000-0x00000000007E6000-memory.dmp

    Filesize

    408KB