Analysis
-
max time kernel
142s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
22-02-2023 17:40
Static task
static1
Behavioral task
behavioral1
Sample
Purchase-Order-7313 2023-02.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Purchase-Order-7313 2023-02.exe
Resource
win10v2004-20230221-en
General
-
Target
Purchase-Order-7313 2023-02.exe
-
Size
597KB
-
MD5
ce8d75a492249b0aff8b6f54e618bc5b
-
SHA1
50957aa6adc9258523375e69d20dd48b8e56c44e
-
SHA256
ab6fe5e7101c50804c400d96dca43a6083c7df4e90b4997c05864773405f34c1
-
SHA512
f92faca2a8cab563d54386ead54f64387302db7788e0b03be7ca4886e3dc20029d9f70c17ff71a0b7e0e8a64970bda6f29f007dcf7d22bf65bc9843ff0bf6377
-
SSDEEP
12288:/Y6WFJdOlrIy2FwYxV5cVLPP2E+pugVnmsa1u/0AtJ6NX8NVYAau5e:/Y6WhOywYZcVLX2vppnEeJ+XFAaf
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Executes dropped EXE 2 IoCs
pid Process 1420 rzagxfxsku.exe 1948 rzagxfxsku.exe -
Loads dropped DLL 2 IoCs
pid Process 1932 Purchase-Order-7313 2023-02.exe 1420 rzagxfxsku.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1420 set thread context of 1948 1420 rzagxfxsku.exe 30 PID 1948 set thread context of 1216 1948 rzagxfxsku.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1420 rzagxfxsku.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1948 rzagxfxsku.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1932 wrote to memory of 1420 1932 Purchase-Order-7313 2023-02.exe 28 PID 1932 wrote to memory of 1420 1932 Purchase-Order-7313 2023-02.exe 28 PID 1932 wrote to memory of 1420 1932 Purchase-Order-7313 2023-02.exe 28 PID 1932 wrote to memory of 1420 1932 Purchase-Order-7313 2023-02.exe 28 PID 1420 wrote to memory of 1948 1420 rzagxfxsku.exe 30 PID 1420 wrote to memory of 1948 1420 rzagxfxsku.exe 30 PID 1420 wrote to memory of 1948 1420 rzagxfxsku.exe 30 PID 1420 wrote to memory of 1948 1420 rzagxfxsku.exe 30 PID 1420 wrote to memory of 1948 1420 rzagxfxsku.exe 30 PID 1948 wrote to memory of 1216 1948 rzagxfxsku.exe 31 PID 1948 wrote to memory of 1216 1948 rzagxfxsku.exe 31 PID 1948 wrote to memory of 1216 1948 rzagxfxsku.exe 31 PID 1948 wrote to memory of 1216 1948 rzagxfxsku.exe 31 PID 1948 wrote to memory of 1216 1948 rzagxfxsku.exe 31 PID 1948 wrote to memory of 1216 1948 rzagxfxsku.exe 31 PID 1948 wrote to memory of 1216 1948 rzagxfxsku.exe 31 PID 1948 wrote to memory of 1216 1948 rzagxfxsku.exe 31 PID 1948 wrote to memory of 1216 1948 rzagxfxsku.exe 31 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Purchase-Order-7313 2023-02.exe"C:\Users\Admin\AppData\Local\Temp\Purchase-Order-7313 2023-02.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\rzagxfxsku.exe"C:\Users\Admin\AppData\Local\Temp\rzagxfxsku.exe" C:\Users\Admin\AppData\Local\Temp\snvvmklm.r2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\rzagxfxsku.exe"C:\Users\Admin\AppData\Local\Temp\rzagxfxsku.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe4⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:1216
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
460KB
MD54f8041e2005c4e6c561d9e0a219f266f
SHA189bb26a89d6f91b05cbbeca4f133fc41206be48e
SHA256924186e69031c49e994c015957440eb8201601b31be68cbbb14edfa563355030
SHA512bb578b4b4201f9819f0686d0ad66cd62a482771e7856f89074e2b4868e4d50925b06ba50aec8f473180c42b708017633bacd2e2f84178d02dd7c9eb4894f18ac
-
Filesize
296KB
MD5759d318a050b6c76fde3263640604559
SHA11b4eef994aeb3aa0cffb7ede3a4a521a705c036e
SHA25621f969b6030a00e4a0cd7bfceb3b4cd79f151d5927a63d3504b1bde980838a4d
SHA512344552f5dded8e67a0d3ee52652fbc93f34fc125a9e10e9cd263b101f7e2646df38219ea6ca96740d894cce4003b5b8ce5638501b651717c5385099890466833
-
Filesize
296KB
MD5759d318a050b6c76fde3263640604559
SHA11b4eef994aeb3aa0cffb7ede3a4a521a705c036e
SHA25621f969b6030a00e4a0cd7bfceb3b4cd79f151d5927a63d3504b1bde980838a4d
SHA512344552f5dded8e67a0d3ee52652fbc93f34fc125a9e10e9cd263b101f7e2646df38219ea6ca96740d894cce4003b5b8ce5638501b651717c5385099890466833
-
Filesize
296KB
MD5759d318a050b6c76fde3263640604559
SHA11b4eef994aeb3aa0cffb7ede3a4a521a705c036e
SHA25621f969b6030a00e4a0cd7bfceb3b4cd79f151d5927a63d3504b1bde980838a4d
SHA512344552f5dded8e67a0d3ee52652fbc93f34fc125a9e10e9cd263b101f7e2646df38219ea6ca96740d894cce4003b5b8ce5638501b651717c5385099890466833
-
Filesize
5KB
MD5ee619fde530b225d204a2ea7d445cdf5
SHA101b26e6d8bcbd6fa753da60f397c7692ffb5fba7
SHA2560896ce722346e25794be5f5e6516377346bdb1d70e363200d19879d1e19ec90e
SHA512a53c1f317b87f9cfdd389d66a2b7813f097c14d805ab366643da0c57ccf2164c88e9c464c87f6f7507674d06b70bf1fabc0ff2c085b4a881890b93504f63f701
-
Filesize
296KB
MD5759d318a050b6c76fde3263640604559
SHA11b4eef994aeb3aa0cffb7ede3a4a521a705c036e
SHA25621f969b6030a00e4a0cd7bfceb3b4cd79f151d5927a63d3504b1bde980838a4d
SHA512344552f5dded8e67a0d3ee52652fbc93f34fc125a9e10e9cd263b101f7e2646df38219ea6ca96740d894cce4003b5b8ce5638501b651717c5385099890466833
-
Filesize
296KB
MD5759d318a050b6c76fde3263640604559
SHA11b4eef994aeb3aa0cffb7ede3a4a521a705c036e
SHA25621f969b6030a00e4a0cd7bfceb3b4cd79f151d5927a63d3504b1bde980838a4d
SHA512344552f5dded8e67a0d3ee52652fbc93f34fc125a9e10e9cd263b101f7e2646df38219ea6ca96740d894cce4003b5b8ce5638501b651717c5385099890466833