Analysis
-
max time kernel
149s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
08-04-2023 07:04
Static task
static1
Behavioral task
behavioral1
Sample
709b07ef6d3a105e4f17eb92f6978c9b8597c8297f6391303670e2adaed90592.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
709b07ef6d3a105e4f17eb92f6978c9b8597c8297f6391303670e2adaed90592.exe
Resource
win10v2004-20230220-en
General
-
Target
709b07ef6d3a105e4f17eb92f6978c9b8597c8297f6391303670e2adaed90592.exe
-
Size
504KB
-
MD5
76ef6dcc228516addb85969c619845f8
-
SHA1
ec42d448daf3645b980588f03e4a1d50a068e302
-
SHA256
709b07ef6d3a105e4f17eb92f6978c9b8597c8297f6391303670e2adaed90592
-
SHA512
4b37f2b3b5977a9d55021c02654095d79125838df1759684a93d08732777fe411841395179198a7c121b1f3ffd59d7c7d31b2ed9387d4e0765265c09716d1f0e
-
SSDEEP
12288:/YuffiNQGwOEphdUyTd7RqcNEb2SqH4y8jw:/YuffiQGwOERlucuqbv
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5450700540:AAEJyEEV8BKgYUKmnCPZxp19kD9GVSRup5M/sendMessage?chat_id=5422342474
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Executes dropped EXE 2 IoCs
pid Process 4120 nbagek.exe 3148 nbagek.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4120 set thread context of 3148 4120 nbagek.exe 83 PID 3148 set thread context of 1152 3148 nbagek.exe 84 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 13 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4120 nbagek.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3148 nbagek.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1248 wrote to memory of 4120 1248 709b07ef6d3a105e4f17eb92f6978c9b8597c8297f6391303670e2adaed90592.exe 82 PID 1248 wrote to memory of 4120 1248 709b07ef6d3a105e4f17eb92f6978c9b8597c8297f6391303670e2adaed90592.exe 82 PID 1248 wrote to memory of 4120 1248 709b07ef6d3a105e4f17eb92f6978c9b8597c8297f6391303670e2adaed90592.exe 82 PID 4120 wrote to memory of 3148 4120 nbagek.exe 83 PID 4120 wrote to memory of 3148 4120 nbagek.exe 83 PID 4120 wrote to memory of 3148 4120 nbagek.exe 83 PID 4120 wrote to memory of 3148 4120 nbagek.exe 83 PID 3148 wrote to memory of 1152 3148 nbagek.exe 84 PID 3148 wrote to memory of 1152 3148 nbagek.exe 84 PID 3148 wrote to memory of 1152 3148 nbagek.exe 84 PID 3148 wrote to memory of 1152 3148 nbagek.exe 84 PID 3148 wrote to memory of 1152 3148 nbagek.exe 84 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\709b07ef6d3a105e4f17eb92f6978c9b8597c8297f6391303670e2adaed90592.exe"C:\Users\Admin\AppData\Local\Temp\709b07ef6d3a105e4f17eb92f6978c9b8597c8297f6391303670e2adaed90592.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\nbagek.exe"C:\Users\Admin\AppData\Local\Temp\nbagek.exe" C:\Users\Admin\AppData\Local\Temp\usjvx.r2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\nbagek.exe"C:\Users\Admin\AppData\Local\Temp\nbagek.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe4⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:1152
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
460KB
MD59d5bd78f657d9ccef877c3beef82759c
SHA1539ae458cd7a065d0284223f665a6e8f0ee578a0
SHA2566de95df699cfe0c0b66493b584345c1c3f469dc9394c3d0405bba8eafdd21ba8
SHA5127edebc7d46b64253704c95cbce13e1debba75625f17ff370526c8ae78cba000e2badf346cae00d9acbccb4fb1b50974ef10498f995d8f3319f95947eb182ab03
-
Filesize
58KB
MD57b2dababe7304999f68211fdaa1148ce
SHA13a053a885695db89f28c797ac3c8f69c39246385
SHA2562885c4d23594a128e1b7fe02b2ea18adf29a5f2ac5db0b304c35285cd14dad31
SHA512366f118fe9bb594d5f2c38309aa58babd0be6da675a764c5f939e7ae6889cad64873c550d79c3f2fdb17dbe97e609b2a24bb7207f7bb78434edefd83f30fe1ef
-
Filesize
58KB
MD57b2dababe7304999f68211fdaa1148ce
SHA13a053a885695db89f28c797ac3c8f69c39246385
SHA2562885c4d23594a128e1b7fe02b2ea18adf29a5f2ac5db0b304c35285cd14dad31
SHA512366f118fe9bb594d5f2c38309aa58babd0be6da675a764c5f939e7ae6889cad64873c550d79c3f2fdb17dbe97e609b2a24bb7207f7bb78434edefd83f30fe1ef
-
Filesize
58KB
MD57b2dababe7304999f68211fdaa1148ce
SHA13a053a885695db89f28c797ac3c8f69c39246385
SHA2562885c4d23594a128e1b7fe02b2ea18adf29a5f2ac5db0b304c35285cd14dad31
SHA512366f118fe9bb594d5f2c38309aa58babd0be6da675a764c5f939e7ae6889cad64873c550d79c3f2fdb17dbe97e609b2a24bb7207f7bb78434edefd83f30fe1ef
-
Filesize
5KB
MD56bc43682a311227742e5a6dfff67160b
SHA136054c3b086af268f3f1274eb66b167fe66712d3
SHA256882d92f276cfc9c196fe2bf27dd3fbb24b0e5b473791d2d4ac716ec0da17cac8
SHA512f3b153d2c73662dddf5d8c1bfd342409edfbac6931c6d867928aedef61d7c3ee4511a9da5721843bd78f394be9008f71829cbc16e9f106dadd5f5615faf1b9c2