Analysis
-
max time kernel
146s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
22-02-2023 17:40
Static task
static1
Behavioral task
behavioral1
Sample
Purchase-Order-7313 2023-02.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Purchase-Order-7313 2023-02.exe
Resource
win10v2004-20230221-en
General
-
Target
Purchase-Order-7313 2023-02.exe
-
Size
597KB
-
MD5
ce8d75a492249b0aff8b6f54e618bc5b
-
SHA1
50957aa6adc9258523375e69d20dd48b8e56c44e
-
SHA256
ab6fe5e7101c50804c400d96dca43a6083c7df4e90b4997c05864773405f34c1
-
SHA512
f92faca2a8cab563d54386ead54f64387302db7788e0b03be7ca4886e3dc20029d9f70c17ff71a0b7e0e8a64970bda6f29f007dcf7d22bf65bc9843ff0bf6377
-
SSDEEP
12288:/Y6WFJdOlrIy2FwYxV5cVLPP2E+pugVnmsa1u/0AtJ6NX8NVYAau5e:/Y6WhOywYZcVLX2vppnEeJ+XFAaf
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Executes dropped EXE 2 IoCs
pid Process 2608 rzagxfxsku.exe 1584 rzagxfxsku.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2608 set thread context of 1584 2608 rzagxfxsku.exe 83 PID 1584 set thread context of 3980 1584 rzagxfxsku.exe 84 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 2 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2608 rzagxfxsku.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1584 rzagxfxsku.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4240 wrote to memory of 2608 4240 Purchase-Order-7313 2023-02.exe 81 PID 4240 wrote to memory of 2608 4240 Purchase-Order-7313 2023-02.exe 81 PID 4240 wrote to memory of 2608 4240 Purchase-Order-7313 2023-02.exe 81 PID 2608 wrote to memory of 1584 2608 rzagxfxsku.exe 83 PID 2608 wrote to memory of 1584 2608 rzagxfxsku.exe 83 PID 2608 wrote to memory of 1584 2608 rzagxfxsku.exe 83 PID 2608 wrote to memory of 1584 2608 rzagxfxsku.exe 83 PID 1584 wrote to memory of 3980 1584 rzagxfxsku.exe 84 PID 1584 wrote to memory of 3980 1584 rzagxfxsku.exe 84 PID 1584 wrote to memory of 3980 1584 rzagxfxsku.exe 84 PID 1584 wrote to memory of 3980 1584 rzagxfxsku.exe 84 PID 1584 wrote to memory of 3980 1584 rzagxfxsku.exe 84 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Purchase-Order-7313 2023-02.exe"C:\Users\Admin\AppData\Local\Temp\Purchase-Order-7313 2023-02.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\rzagxfxsku.exe"C:\Users\Admin\AppData\Local\Temp\rzagxfxsku.exe" C:\Users\Admin\AppData\Local\Temp\snvvmklm.r2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\rzagxfxsku.exe"C:\Users\Admin\AppData\Local\Temp\rzagxfxsku.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe4⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:3980
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
460KB
MD54f8041e2005c4e6c561d9e0a219f266f
SHA189bb26a89d6f91b05cbbeca4f133fc41206be48e
SHA256924186e69031c49e994c015957440eb8201601b31be68cbbb14edfa563355030
SHA512bb578b4b4201f9819f0686d0ad66cd62a482771e7856f89074e2b4868e4d50925b06ba50aec8f473180c42b708017633bacd2e2f84178d02dd7c9eb4894f18ac
-
Filesize
296KB
MD5759d318a050b6c76fde3263640604559
SHA11b4eef994aeb3aa0cffb7ede3a4a521a705c036e
SHA25621f969b6030a00e4a0cd7bfceb3b4cd79f151d5927a63d3504b1bde980838a4d
SHA512344552f5dded8e67a0d3ee52652fbc93f34fc125a9e10e9cd263b101f7e2646df38219ea6ca96740d894cce4003b5b8ce5638501b651717c5385099890466833
-
Filesize
296KB
MD5759d318a050b6c76fde3263640604559
SHA11b4eef994aeb3aa0cffb7ede3a4a521a705c036e
SHA25621f969b6030a00e4a0cd7bfceb3b4cd79f151d5927a63d3504b1bde980838a4d
SHA512344552f5dded8e67a0d3ee52652fbc93f34fc125a9e10e9cd263b101f7e2646df38219ea6ca96740d894cce4003b5b8ce5638501b651717c5385099890466833
-
Filesize
296KB
MD5759d318a050b6c76fde3263640604559
SHA11b4eef994aeb3aa0cffb7ede3a4a521a705c036e
SHA25621f969b6030a00e4a0cd7bfceb3b4cd79f151d5927a63d3504b1bde980838a4d
SHA512344552f5dded8e67a0d3ee52652fbc93f34fc125a9e10e9cd263b101f7e2646df38219ea6ca96740d894cce4003b5b8ce5638501b651717c5385099890466833
-
Filesize
5KB
MD5ee619fde530b225d204a2ea7d445cdf5
SHA101b26e6d8bcbd6fa753da60f397c7692ffb5fba7
SHA2560896ce722346e25794be5f5e6516377346bdb1d70e363200d19879d1e19ec90e
SHA512a53c1f317b87f9cfdd389d66a2b7813f097c14d805ab366643da0c57ccf2164c88e9c464c87f6f7507674d06b70bf1fabc0ff2c085b4a881890b93504f63f701