Analysis
-
max time kernel
30s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
08-04-2023 07:04
Static task
static1
Behavioral task
behavioral1
Sample
709b07ef6d3a105e4f17eb92f6978c9b8597c8297f6391303670e2adaed90592.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
709b07ef6d3a105e4f17eb92f6978c9b8597c8297f6391303670e2adaed90592.exe
Resource
win10v2004-20230220-en
General
-
Target
709b07ef6d3a105e4f17eb92f6978c9b8597c8297f6391303670e2adaed90592.exe
-
Size
504KB
-
MD5
76ef6dcc228516addb85969c619845f8
-
SHA1
ec42d448daf3645b980588f03e4a1d50a068e302
-
SHA256
709b07ef6d3a105e4f17eb92f6978c9b8597c8297f6391303670e2adaed90592
-
SHA512
4b37f2b3b5977a9d55021c02654095d79125838df1759684a93d08732777fe411841395179198a7c121b1f3ffd59d7c7d31b2ed9387d4e0765265c09716d1f0e
-
SSDEEP
12288:/YuffiNQGwOEphdUyTd7RqcNEb2SqH4y8jw:/YuffiQGwOERlucuqbv
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5450700540:AAEJyEEV8BKgYUKmnCPZxp19kD9GVSRup5M/sendMessage?chat_id=5422342474
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Executes dropped EXE 3 IoCs
pid Process 924 nbagek.exe 552 nbagek.exe 1496 nbagek.exe -
Loads dropped DLL 4 IoCs
pid Process 1532 709b07ef6d3a105e4f17eb92f6978c9b8597c8297f6391303670e2adaed90592.exe 1532 709b07ef6d3a105e4f17eb92f6978c9b8597c8297f6391303670e2adaed90592.exe 924 nbagek.exe 924 nbagek.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 924 set thread context of 1496 924 nbagek.exe 30 PID 1496 set thread context of 616 1496 nbagek.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 924 nbagek.exe 924 nbagek.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1496 nbagek.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1532 wrote to memory of 924 1532 709b07ef6d3a105e4f17eb92f6978c9b8597c8297f6391303670e2adaed90592.exe 28 PID 1532 wrote to memory of 924 1532 709b07ef6d3a105e4f17eb92f6978c9b8597c8297f6391303670e2adaed90592.exe 28 PID 1532 wrote to memory of 924 1532 709b07ef6d3a105e4f17eb92f6978c9b8597c8297f6391303670e2adaed90592.exe 28 PID 1532 wrote to memory of 924 1532 709b07ef6d3a105e4f17eb92f6978c9b8597c8297f6391303670e2adaed90592.exe 28 PID 924 wrote to memory of 552 924 nbagek.exe 29 PID 924 wrote to memory of 552 924 nbagek.exe 29 PID 924 wrote to memory of 552 924 nbagek.exe 29 PID 924 wrote to memory of 552 924 nbagek.exe 29 PID 924 wrote to memory of 1496 924 nbagek.exe 30 PID 924 wrote to memory of 1496 924 nbagek.exe 30 PID 924 wrote to memory of 1496 924 nbagek.exe 30 PID 924 wrote to memory of 1496 924 nbagek.exe 30 PID 924 wrote to memory of 1496 924 nbagek.exe 30 PID 1496 wrote to memory of 616 1496 nbagek.exe 31 PID 1496 wrote to memory of 616 1496 nbagek.exe 31 PID 1496 wrote to memory of 616 1496 nbagek.exe 31 PID 1496 wrote to memory of 616 1496 nbagek.exe 31 PID 1496 wrote to memory of 616 1496 nbagek.exe 31 PID 1496 wrote to memory of 616 1496 nbagek.exe 31 PID 1496 wrote to memory of 616 1496 nbagek.exe 31 PID 1496 wrote to memory of 616 1496 nbagek.exe 31 PID 1496 wrote to memory of 616 1496 nbagek.exe 31 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\709b07ef6d3a105e4f17eb92f6978c9b8597c8297f6391303670e2adaed90592.exe"C:\Users\Admin\AppData\Local\Temp\709b07ef6d3a105e4f17eb92f6978c9b8597c8297f6391303670e2adaed90592.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\nbagek.exe"C:\Users\Admin\AppData\Local\Temp\nbagek.exe" C:\Users\Admin\AppData\Local\Temp\usjvx.r2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Users\Admin\AppData\Local\Temp\nbagek.exe"C:\Users\Admin\AppData\Local\Temp\nbagek.exe"3⤵
- Executes dropped EXE
PID:552
-
-
C:\Users\Admin\AppData\Local\Temp\nbagek.exe"C:\Users\Admin\AppData\Local\Temp\nbagek.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe4⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:616
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
460KB
MD59d5bd78f657d9ccef877c3beef82759c
SHA1539ae458cd7a065d0284223f665a6e8f0ee578a0
SHA2566de95df699cfe0c0b66493b584345c1c3f469dc9394c3d0405bba8eafdd21ba8
SHA5127edebc7d46b64253704c95cbce13e1debba75625f17ff370526c8ae78cba000e2badf346cae00d9acbccb4fb1b50974ef10498f995d8f3319f95947eb182ab03
-
Filesize
58KB
MD57b2dababe7304999f68211fdaa1148ce
SHA13a053a885695db89f28c797ac3c8f69c39246385
SHA2562885c4d23594a128e1b7fe02b2ea18adf29a5f2ac5db0b304c35285cd14dad31
SHA512366f118fe9bb594d5f2c38309aa58babd0be6da675a764c5f939e7ae6889cad64873c550d79c3f2fdb17dbe97e609b2a24bb7207f7bb78434edefd83f30fe1ef
-
Filesize
58KB
MD57b2dababe7304999f68211fdaa1148ce
SHA13a053a885695db89f28c797ac3c8f69c39246385
SHA2562885c4d23594a128e1b7fe02b2ea18adf29a5f2ac5db0b304c35285cd14dad31
SHA512366f118fe9bb594d5f2c38309aa58babd0be6da675a764c5f939e7ae6889cad64873c550d79c3f2fdb17dbe97e609b2a24bb7207f7bb78434edefd83f30fe1ef
-
Filesize
58KB
MD57b2dababe7304999f68211fdaa1148ce
SHA13a053a885695db89f28c797ac3c8f69c39246385
SHA2562885c4d23594a128e1b7fe02b2ea18adf29a5f2ac5db0b304c35285cd14dad31
SHA512366f118fe9bb594d5f2c38309aa58babd0be6da675a764c5f939e7ae6889cad64873c550d79c3f2fdb17dbe97e609b2a24bb7207f7bb78434edefd83f30fe1ef
-
Filesize
58KB
MD57b2dababe7304999f68211fdaa1148ce
SHA13a053a885695db89f28c797ac3c8f69c39246385
SHA2562885c4d23594a128e1b7fe02b2ea18adf29a5f2ac5db0b304c35285cd14dad31
SHA512366f118fe9bb594d5f2c38309aa58babd0be6da675a764c5f939e7ae6889cad64873c550d79c3f2fdb17dbe97e609b2a24bb7207f7bb78434edefd83f30fe1ef
-
Filesize
58KB
MD57b2dababe7304999f68211fdaa1148ce
SHA13a053a885695db89f28c797ac3c8f69c39246385
SHA2562885c4d23594a128e1b7fe02b2ea18adf29a5f2ac5db0b304c35285cd14dad31
SHA512366f118fe9bb594d5f2c38309aa58babd0be6da675a764c5f939e7ae6889cad64873c550d79c3f2fdb17dbe97e609b2a24bb7207f7bb78434edefd83f30fe1ef
-
Filesize
5KB
MD56bc43682a311227742e5a6dfff67160b
SHA136054c3b086af268f3f1274eb66b167fe66712d3
SHA256882d92f276cfc9c196fe2bf27dd3fbb24b0e5b473791d2d4ac716ec0da17cac8
SHA512f3b153d2c73662dddf5d8c1bfd342409edfbac6931c6d867928aedef61d7c3ee4511a9da5721843bd78f394be9008f71829cbc16e9f106dadd5f5615faf1b9c2
-
Filesize
58KB
MD57b2dababe7304999f68211fdaa1148ce
SHA13a053a885695db89f28c797ac3c8f69c39246385
SHA2562885c4d23594a128e1b7fe02b2ea18adf29a5f2ac5db0b304c35285cd14dad31
SHA512366f118fe9bb594d5f2c38309aa58babd0be6da675a764c5f939e7ae6889cad64873c550d79c3f2fdb17dbe97e609b2a24bb7207f7bb78434edefd83f30fe1ef
-
Filesize
58KB
MD57b2dababe7304999f68211fdaa1148ce
SHA13a053a885695db89f28c797ac3c8f69c39246385
SHA2562885c4d23594a128e1b7fe02b2ea18adf29a5f2ac5db0b304c35285cd14dad31
SHA512366f118fe9bb594d5f2c38309aa58babd0be6da675a764c5f939e7ae6889cad64873c550d79c3f2fdb17dbe97e609b2a24bb7207f7bb78434edefd83f30fe1ef
-
Filesize
58KB
MD57b2dababe7304999f68211fdaa1148ce
SHA13a053a885695db89f28c797ac3c8f69c39246385
SHA2562885c4d23594a128e1b7fe02b2ea18adf29a5f2ac5db0b304c35285cd14dad31
SHA512366f118fe9bb594d5f2c38309aa58babd0be6da675a764c5f939e7ae6889cad64873c550d79c3f2fdb17dbe97e609b2a24bb7207f7bb78434edefd83f30fe1ef
-
Filesize
58KB
MD57b2dababe7304999f68211fdaa1148ce
SHA13a053a885695db89f28c797ac3c8f69c39246385
SHA2562885c4d23594a128e1b7fe02b2ea18adf29a5f2ac5db0b304c35285cd14dad31
SHA512366f118fe9bb594d5f2c38309aa58babd0be6da675a764c5f939e7ae6889cad64873c550d79c3f2fdb17dbe97e609b2a24bb7207f7bb78434edefd83f30fe1ef