Analysis
-
max time kernel
146s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22-02-2023 04:10
Static task
static1
Behavioral task
behavioral1
Sample
New Order.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
New Order.exe
Resource
win10v2004-20230220-en
General
-
Target
New Order.exe
-
Size
499KB
-
MD5
ffa979499187908e3abd52a5eb23ba98
-
SHA1
313c4451e3e5473732c9b2cef7c943060a91f452
-
SHA256
1cd904a688c0d0f13f06c5c113ad638649ab10c1ed756dc65933f34bbf22014b
-
SHA512
1861e3b2593934611181c71c31d2237bb8df839d555f003e8b4110a9d1ab4612180fd59af97349be0cf416a2e7fc455f7f39e62f4785deb2c94bc503985ed31f
-
SSDEEP
12288:/Ysz65It6fQFY4LvtsnEdCBl5cll3rVLDHqFS:/YszDt6fQnGnGWilt5DHqFS
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Executes dropped EXE 2 IoCs
pid Process 4212 mffvxezi.exe 4472 mffvxezi.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4212 set thread context of 4472 4212 mffvxezi.exe 86 PID 4472 set thread context of 4596 4472 mffvxezi.exe 87 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 38 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4212 mffvxezi.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4472 mffvxezi.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2184 wrote to memory of 4212 2184 New Order.exe 84 PID 2184 wrote to memory of 4212 2184 New Order.exe 84 PID 2184 wrote to memory of 4212 2184 New Order.exe 84 PID 4212 wrote to memory of 4472 4212 mffvxezi.exe 86 PID 4212 wrote to memory of 4472 4212 mffvxezi.exe 86 PID 4212 wrote to memory of 4472 4212 mffvxezi.exe 86 PID 4212 wrote to memory of 4472 4212 mffvxezi.exe 86 PID 4472 wrote to memory of 4596 4472 mffvxezi.exe 87 PID 4472 wrote to memory of 4596 4472 mffvxezi.exe 87 PID 4472 wrote to memory of 4596 4472 mffvxezi.exe 87 PID 4472 wrote to memory of 4596 4472 mffvxezi.exe 87 PID 4472 wrote to memory of 4596 4472 mffvxezi.exe 87 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\New Order.exe"C:\Users\Admin\AppData\Local\Temp\New Order.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\mffvxezi.exe"C:\Users\Admin\AppData\Local\Temp\mffvxezi.exe" C:\Users\Admin\AppData\Local\Temp\snifuco.iq2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\mffvxezi.exe"C:\Users\Admin\AppData\Local\Temp\mffvxezi.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe4⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:4596
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51KB
MD52134ed2666a31230c9bd0585df9108c5
SHA1e2d6f04a2f7a501156039d171811b4040fc61b88
SHA2563cd705626487ded747739f6198aa83c194a88b39272ee0301cb8c2c1c51cc7c0
SHA512a64453fedc9cc8ea6c0feb6e0bc1fa5a122fc7c134209a99e0b09f9b39427c12d7adf8e0027e5e77ed09d7e771c4011f47517c46781d7ce1f0c7da3835682eba
-
Filesize
51KB
MD52134ed2666a31230c9bd0585df9108c5
SHA1e2d6f04a2f7a501156039d171811b4040fc61b88
SHA2563cd705626487ded747739f6198aa83c194a88b39272ee0301cb8c2c1c51cc7c0
SHA512a64453fedc9cc8ea6c0feb6e0bc1fa5a122fc7c134209a99e0b09f9b39427c12d7adf8e0027e5e77ed09d7e771c4011f47517c46781d7ce1f0c7da3835682eba
-
Filesize
51KB
MD52134ed2666a31230c9bd0585df9108c5
SHA1e2d6f04a2f7a501156039d171811b4040fc61b88
SHA2563cd705626487ded747739f6198aa83c194a88b39272ee0301cb8c2c1c51cc7c0
SHA512a64453fedc9cc8ea6c0feb6e0bc1fa5a122fc7c134209a99e0b09f9b39427c12d7adf8e0027e5e77ed09d7e771c4011f47517c46781d7ce1f0c7da3835682eba
-
Filesize
5KB
MD5b0ab93399d2027f55cdf6f38c81acc5a
SHA1f7fccc5c607ab7d7f79c4cc218c25a2220875c23
SHA256de91d22e23487e5adf49b443ef5bccad801e5d1e76dbb6cf3506dce6bb18f810
SHA5128c443d4b5bd4c2909bea4a3c975d0fa7c528119ab7ee422d99f4a23c759c747d333dee46d594febcd503774d4c82984ba0ae164470e30e8cc62532dc9f8f96a4
-
Filesize
460KB
MD5665d5cd0268ed15a92a888ce3e9e72d3
SHA1cdb279ae18f5514f568bdb9cd535285094cc0013
SHA256666bd98e8a6a2fab060d810f0cb81e3e2bdaf1b0c2a8c5c950afa9018ebeaa82
SHA512cb2d73efab3a14266cb4d7837ad31fbd06e94253546140c1ba92103c7aa7b7e006a6a8e47e80372ad34079f1da960166a760e0b1bd9a7328682aa930ed8a4d79