Analysis

  • max time kernel
    149s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-03-2023 14:29

General

  • Target

    PO_NOD361640407.exe

  • Size

    507KB

  • MD5

    36ee10e6a66f23f15c8f22f3a446facb

  • SHA1

    9ec9c892f375abc10508b5db565ab959d48bd127

  • SHA256

    d6ae7fc8b53cc5e38e27e5c364806ddab33fb6a2b3339ecb8e79cce57839c21d

  • SHA512

    85db305b945f2f6a14c04d0b30e59643ccce5f8b0f214614c6b58d032f47f181a6a45498ea6e1fec23a24fbc7e8cbc7ea9cec7d402d894fc9e3b088bfa8d4e09

  • SSDEEP

    12288:/YyvATUqd2XlTTuFa0uJ1iku0efT1l4gsz26VXPSjzRaWsVLwsJP:/Yyv5I2X4FiJu0al4gsz26wzYt91

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5450700540:AAEJyEEV8BKgYUKmnCPZxp19kD9GVSRup5M/sendMessage?chat_id=5422342474

Signatures

  • BluStealer

    A Modular information stealer written in Visual Basic.

  • Executes dropped EXE 2 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PO_NOD361640407.exe
    "C:\Users\Admin\AppData\Local\Temp\PO_NOD361640407.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4444
    • C:\Users\Admin\AppData\Local\Temp\sdymllnxzv.exe
      "C:\Users\Admin\AppData\Local\Temp\sdymllnxzv.exe" C:\Users\Admin\AppData\Local\Temp\kbwxt.nub
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:648
      • C:\Users\Admin\AppData\Local\Temp\sdymllnxzv.exe
        "C:\Users\Admin\AppData\Local\Temp\sdymllnxzv.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4724
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          4⤵
          • Accesses Microsoft Outlook profiles
          • outlook_office_path
          • outlook_win_path
          PID:4988

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\kbwxt.nub

    Filesize

    5KB

    MD5

    798fa71d9de653cad7e62856687cb823

    SHA1

    fe71de33abed9ba908a7cc1086e3fdfabecd4509

    SHA256

    557c5524818d8cb3e6dd21b21fd82a2d0b7ab2495c83b39617cbed58e3c78089

    SHA512

    50a821dfc8d1c3ded252188c7b0ed98a658d6aa8a44902a3595a3808c315b67a48104b9b464998cad1592cee7d07a8c081d283ee800b39638b18dfea1b5e1b08

  • C:\Users\Admin\AppData\Local\Temp\ngmqnc.mzy

    Filesize

    460KB

    MD5

    c4c3a8ff3d816daa20e00ecacaf1d862

    SHA1

    9b88079891990b8192e45572c4ef05659b9459b3

    SHA256

    18a0eabfd76f0e73c826c72c302bccc3f94242512f062b039d9c8ab3fc907ad8

    SHA512

    22c1d3b6c84d4f25a8254178127b8bad5cc6094403a7e81c772571a36d0b181eca408308307bb9ae47dd43ba7df49dd2f33e7fd7a1da24c442acf1411b036a67

  • C:\Users\Admin\AppData\Local\Temp\sdymllnxzv.exe

    Filesize

    67KB

    MD5

    b6d78b022e8043e4317996800c98ed5a

    SHA1

    cec80af50f8d16a654a56d15566bf9a410e1ce4b

    SHA256

    d9ba82c00169376684f0cb251bdddba0a0888f6594b7b99ea24a0900ff4d250e

    SHA512

    e1a8a79b976304eb48cb4063ce7ee34fa3e35e10641d2681d0b26f7c1915cbdd6e7c9106bddbd8656744a5e4fc76a9f242892041bdcdd1845d3dfe0cfcc41c72

  • C:\Users\Admin\AppData\Local\Temp\sdymllnxzv.exe

    Filesize

    67KB

    MD5

    b6d78b022e8043e4317996800c98ed5a

    SHA1

    cec80af50f8d16a654a56d15566bf9a410e1ce4b

    SHA256

    d9ba82c00169376684f0cb251bdddba0a0888f6594b7b99ea24a0900ff4d250e

    SHA512

    e1a8a79b976304eb48cb4063ce7ee34fa3e35e10641d2681d0b26f7c1915cbdd6e7c9106bddbd8656744a5e4fc76a9f242892041bdcdd1845d3dfe0cfcc41c72

  • C:\Users\Admin\AppData\Local\Temp\sdymllnxzv.exe

    Filesize

    67KB

    MD5

    b6d78b022e8043e4317996800c98ed5a

    SHA1

    cec80af50f8d16a654a56d15566bf9a410e1ce4b

    SHA256

    d9ba82c00169376684f0cb251bdddba0a0888f6594b7b99ea24a0900ff4d250e

    SHA512

    e1a8a79b976304eb48cb4063ce7ee34fa3e35e10641d2681d0b26f7c1915cbdd6e7c9106bddbd8656744a5e4fc76a9f242892041bdcdd1845d3dfe0cfcc41c72

  • memory/4724-163-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4724-165-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4724-174-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4724-173-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4724-151-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4724-152-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4724-162-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4724-141-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4724-164-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4724-145-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4724-166-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4724-167-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4724-168-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4724-169-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4724-170-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4724-171-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4724-172-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4988-149-0x0000000004FD0000-0x000000000506C000-memory.dmp

    Filesize

    624KB

  • memory/4988-148-0x0000000000800000-0x0000000000866000-memory.dmp

    Filesize

    408KB