Analysis

  • max time kernel
    147s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-03-2023 13:27

General

  • Target

    1cd904a688c0d0f13f06c5c113ad638649ab10c1ed756dc65933f34bbf22014b.exe

  • Size

    499KB

  • MD5

    ffa979499187908e3abd52a5eb23ba98

  • SHA1

    313c4451e3e5473732c9b2cef7c943060a91f452

  • SHA256

    1cd904a688c0d0f13f06c5c113ad638649ab10c1ed756dc65933f34bbf22014b

  • SHA512

    1861e3b2593934611181c71c31d2237bb8df839d555f003e8b4110a9d1ab4612180fd59af97349be0cf416a2e7fc455f7f39e62f4785deb2c94bc503985ed31f

  • SSDEEP

    12288:/Ysz65It6fQFY4LvtsnEdCBl5cll3rVLDHqFS:/YszDt6fQnGnGWilt5DHqFS

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325

Signatures

  • BluStealer

    A Modular information stealer written in Visual Basic.

  • Executes dropped EXE 2 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1cd904a688c0d0f13f06c5c113ad638649ab10c1ed756dc65933f34bbf22014b.exe
    "C:\Users\Admin\AppData\Local\Temp\1cd904a688c0d0f13f06c5c113ad638649ab10c1ed756dc65933f34bbf22014b.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4384
    • C:\Users\Admin\AppData\Local\Temp\mffvxezi.exe
      "C:\Users\Admin\AppData\Local\Temp\mffvxezi.exe" C:\Users\Admin\AppData\Local\Temp\snifuco.iq
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:1484
      • C:\Users\Admin\AppData\Local\Temp\mffvxezi.exe
        "C:\Users\Admin\AppData\Local\Temp\mffvxezi.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1088
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          4⤵
          • Accesses Microsoft Outlook profiles
          • outlook_office_path
          • outlook_win_path
          PID:4628

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\mffvxezi.exe

    Filesize

    51KB

    MD5

    2134ed2666a31230c9bd0585df9108c5

    SHA1

    e2d6f04a2f7a501156039d171811b4040fc61b88

    SHA256

    3cd705626487ded747739f6198aa83c194a88b39272ee0301cb8c2c1c51cc7c0

    SHA512

    a64453fedc9cc8ea6c0feb6e0bc1fa5a122fc7c134209a99e0b09f9b39427c12d7adf8e0027e5e77ed09d7e771c4011f47517c46781d7ce1f0c7da3835682eba

  • C:\Users\Admin\AppData\Local\Temp\mffvxezi.exe

    Filesize

    51KB

    MD5

    2134ed2666a31230c9bd0585df9108c5

    SHA1

    e2d6f04a2f7a501156039d171811b4040fc61b88

    SHA256

    3cd705626487ded747739f6198aa83c194a88b39272ee0301cb8c2c1c51cc7c0

    SHA512

    a64453fedc9cc8ea6c0feb6e0bc1fa5a122fc7c134209a99e0b09f9b39427c12d7adf8e0027e5e77ed09d7e771c4011f47517c46781d7ce1f0c7da3835682eba

  • C:\Users\Admin\AppData\Local\Temp\mffvxezi.exe

    Filesize

    51KB

    MD5

    2134ed2666a31230c9bd0585df9108c5

    SHA1

    e2d6f04a2f7a501156039d171811b4040fc61b88

    SHA256

    3cd705626487ded747739f6198aa83c194a88b39272ee0301cb8c2c1c51cc7c0

    SHA512

    a64453fedc9cc8ea6c0feb6e0bc1fa5a122fc7c134209a99e0b09f9b39427c12d7adf8e0027e5e77ed09d7e771c4011f47517c46781d7ce1f0c7da3835682eba

  • C:\Users\Admin\AppData\Local\Temp\snifuco.iq

    Filesize

    5KB

    MD5

    b0ab93399d2027f55cdf6f38c81acc5a

    SHA1

    f7fccc5c607ab7d7f79c4cc218c25a2220875c23

    SHA256

    de91d22e23487e5adf49b443ef5bccad801e5d1e76dbb6cf3506dce6bb18f810

    SHA512

    8c443d4b5bd4c2909bea4a3c975d0fa7c528119ab7ee422d99f4a23c759c747d333dee46d594febcd503774d4c82984ba0ae164470e30e8cc62532dc9f8f96a4

  • C:\Users\Admin\AppData\Local\Temp\zxylzlmbxk.wj

    Filesize

    460KB

    MD5

    665d5cd0268ed15a92a888ce3e9e72d3

    SHA1

    cdb279ae18f5514f568bdb9cd535285094cc0013

    SHA256

    666bd98e8a6a2fab060d810f0cb81e3e2bdaf1b0c2a8c5c950afa9018ebeaa82

    SHA512

    cb2d73efab3a14266cb4d7837ad31fbd06e94253546140c1ba92103c7aa7b7e006a6a8e47e80372ad34079f1da960166a760e0b1bd9a7328682aa930ed8a4d79

  • memory/1088-154-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/1088-173-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/1088-145-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/1088-149-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/1088-177-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/1088-176-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/1088-175-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/1088-174-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/1088-155-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/1088-156-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/1088-167-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/1088-168-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/1088-169-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/1088-170-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/1088-171-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/1088-172-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/1088-142-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/1484-141-0x00000000005D0000-0x00000000005D2000-memory.dmp

    Filesize

    8KB

  • memory/4628-152-0x0000000005270000-0x000000000530C000-memory.dmp

    Filesize

    624KB

  • memory/4628-151-0x0000000002B00000-0x0000000002B10000-memory.dmp

    Filesize

    64KB

  • memory/4628-150-0x0000000000730000-0x0000000000796000-memory.dmp

    Filesize

    408KB