Analysis
-
max time kernel
146s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
20-04-2023 19:26
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Purchase Order.exe
Resource
win10v2004-20230220-en
General
-
Target
Purchase Order.exe
-
Size
857KB
-
MD5
6762bbcbc3e23a6006e8dbe978b8b85d
-
SHA1
9e60d67c8dc70667d6a04e302fdd9165d55443ab
-
SHA256
7042b9a81eaf1ddd3de522f40e80a915e0e44c6843320013daaa8ee2a842a9e2
-
SHA512
a02cbbe84aa912877332549e0c5715faec099d4c6748d4b22afb032fc219a6ffee4da8aa101d58aa2edb1d82e660a33da55ebc07741e2c7f9c541fe775c6a190
-
SSDEEP
24576:tJqrxgV31OsCcNrd8vK4mMX+kYrj98O4AqUmhZe:tJqtgt1OPYrd8C4vX2jv/
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4084 set thread context of 4868 4084 Purchase Order.exe 93 PID 4868 set thread context of 2244 4868 Purchase Order.exe 94 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 29 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4084 Purchase Order.exe 4084 Purchase Order.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4084 Purchase Order.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4868 Purchase Order.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4084 wrote to memory of 4696 4084 Purchase Order.exe 92 PID 4084 wrote to memory of 4696 4084 Purchase Order.exe 92 PID 4084 wrote to memory of 4696 4084 Purchase Order.exe 92 PID 4084 wrote to memory of 4868 4084 Purchase Order.exe 93 PID 4084 wrote to memory of 4868 4084 Purchase Order.exe 93 PID 4084 wrote to memory of 4868 4084 Purchase Order.exe 93 PID 4084 wrote to memory of 4868 4084 Purchase Order.exe 93 PID 4084 wrote to memory of 4868 4084 Purchase Order.exe 93 PID 4084 wrote to memory of 4868 4084 Purchase Order.exe 93 PID 4084 wrote to memory of 4868 4084 Purchase Order.exe 93 PID 4084 wrote to memory of 4868 4084 Purchase Order.exe 93 PID 4868 wrote to memory of 2244 4868 Purchase Order.exe 94 PID 4868 wrote to memory of 2244 4868 Purchase Order.exe 94 PID 4868 wrote to memory of 2244 4868 Purchase Order.exe 94 PID 4868 wrote to memory of 2244 4868 Purchase Order.exe 94 PID 4868 wrote to memory of 2244 4868 Purchase Order.exe 94 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe"2⤵PID:4696
-
-
C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe3⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:2244
-
-