Analysis
-
max time kernel
146s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
22-02-2023 01:00
Static task
static1
Behavioral task
behavioral1
Sample
8b43fb960fbec0fcdc81a4e12892204c6dc80156258e92995f2a7ece5da3c5b3.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
8b43fb960fbec0fcdc81a4e12892204c6dc80156258e92995f2a7ece5da3c5b3.exe
Resource
win10v2004-20230221-en
General
-
Target
8b43fb960fbec0fcdc81a4e12892204c6dc80156258e92995f2a7ece5da3c5b3.exe
-
Size
597KB
-
MD5
1a496bebdf47aaee63127ad8e0f2c038
-
SHA1
0b4c18d15e7e03fdc58f942236591d01db2a0e15
-
SHA256
8b43fb960fbec0fcdc81a4e12892204c6dc80156258e92995f2a7ece5da3c5b3
-
SHA512
534c1b75d3d581ca07c831ddec2639559f63a4f532b8fa97126f23cbf49dc5b58184a7f0027182b8aed3cb4c028ed334860f15164aa092656289435d3e9acb6d
-
SSDEEP
12288:/Ytho+cYQo+uRRAkbIWsRQ219z0EnDWg9/YG6B5ZdZOkiM:/Yt4YQoRqkV2Eg9h6JdV
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Executes dropped EXE 2 IoCs
pid Process 4328 euhbi.exe 1740 euhbi.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4328 set thread context of 1740 4328 euhbi.exe 84 PID 1740 set thread context of 4460 1740 euhbi.exe 85 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 19 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4328 euhbi.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1740 euhbi.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4868 wrote to memory of 4328 4868 8b43fb960fbec0fcdc81a4e12892204c6dc80156258e92995f2a7ece5da3c5b3.exe 82 PID 4868 wrote to memory of 4328 4868 8b43fb960fbec0fcdc81a4e12892204c6dc80156258e92995f2a7ece5da3c5b3.exe 82 PID 4868 wrote to memory of 4328 4868 8b43fb960fbec0fcdc81a4e12892204c6dc80156258e92995f2a7ece5da3c5b3.exe 82 PID 4328 wrote to memory of 1740 4328 euhbi.exe 84 PID 4328 wrote to memory of 1740 4328 euhbi.exe 84 PID 4328 wrote to memory of 1740 4328 euhbi.exe 84 PID 4328 wrote to memory of 1740 4328 euhbi.exe 84 PID 1740 wrote to memory of 4460 1740 euhbi.exe 85 PID 1740 wrote to memory of 4460 1740 euhbi.exe 85 PID 1740 wrote to memory of 4460 1740 euhbi.exe 85 PID 1740 wrote to memory of 4460 1740 euhbi.exe 85 PID 1740 wrote to memory of 4460 1740 euhbi.exe 85 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b43fb960fbec0fcdc81a4e12892204c6dc80156258e92995f2a7ece5da3c5b3.exe"C:\Users\Admin\AppData\Local\Temp\8b43fb960fbec0fcdc81a4e12892204c6dc80156258e92995f2a7ece5da3c5b3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\euhbi.exe"C:\Users\Admin\AppData\Local\Temp\euhbi.exe" C:\Users\Admin\AppData\Local\Temp\fvrclwc.l2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Users\Admin\AppData\Local\Temp\euhbi.exe"C:\Users\Admin\AppData\Local\Temp\euhbi.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe4⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:4460
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
297KB
MD5c936b4f432c1b9814d77d8717758db4a
SHA1ad63ad2a3a5fa271121c9345b31075128ef395fd
SHA256690e07388b7f6aff8f276c7c44001a5aea4cae4c7918619b7a759d8fd25fc169
SHA512490fd2aa529ccdccde2c476e7dd4aaae601a19d32740795c28cffff029d2d4fb7454ed94c154dfebbb76aad38949dee49e1cdb4148cbbc331238b2a7e83dfc34
-
Filesize
297KB
MD5c936b4f432c1b9814d77d8717758db4a
SHA1ad63ad2a3a5fa271121c9345b31075128ef395fd
SHA256690e07388b7f6aff8f276c7c44001a5aea4cae4c7918619b7a759d8fd25fc169
SHA512490fd2aa529ccdccde2c476e7dd4aaae601a19d32740795c28cffff029d2d4fb7454ed94c154dfebbb76aad38949dee49e1cdb4148cbbc331238b2a7e83dfc34
-
Filesize
297KB
MD5c936b4f432c1b9814d77d8717758db4a
SHA1ad63ad2a3a5fa271121c9345b31075128ef395fd
SHA256690e07388b7f6aff8f276c7c44001a5aea4cae4c7918619b7a759d8fd25fc169
SHA512490fd2aa529ccdccde2c476e7dd4aaae601a19d32740795c28cffff029d2d4fb7454ed94c154dfebbb76aad38949dee49e1cdb4148cbbc331238b2a7e83dfc34
-
Filesize
5KB
MD5f3abfac467d7df3fe80d9244f4a3792f
SHA1ad15978267e72f579cf5dbba1c61f739f929228d
SHA256b57f33a6d276b635dafcf1164f62f45542e5d14bc68b11cd3cb01cd4f463b5f5
SHA51297b1243f5b10abb8e9123baaa798362761902f48ed920b1469a8679cf746240899459bc4fd2dfd3c61a208e366ea4bf12f8f734b1c38e583429abefddb8ec6bb
-
Filesize
460KB
MD5cbbfb2f927b0fabeb1307dad8c24cbe3
SHA16292ff8cd7b8fce506e851f2e0571013b1bc032b
SHA2563733fc350665f2e65be9832630829fd62950558c4eb0f6193be5a8718d7e523d
SHA512997f9f342a14302717ec74ce97fbac60e7c2371641ccad5698dd1540df537ce35d07330d4daf1c17c7dcf8df4803dfa89f0f3277b1760df28fdfdbaba187536d