Analysis
-
max time kernel
183s -
max time network
246s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01-05-2023 20:08
Static task
static1
Behavioral task
behavioral1
Sample
PO_39100.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
PO_39100.exe
Resource
win10v2004-20230220-en
General
-
Target
PO_39100.exe
-
Size
1.5MB
-
MD5
13dc441ec2f9e3f9aa1f354a4b14d318
-
SHA1
05b62c596ca78745d73514cd5d43434929955863
-
SHA256
6f35bb0a7644cfda2468e984269f7febafcb672591a887a8029257dea0801a7c
-
SHA512
30f4da77bf1ba35334fc1812a6792bb91396fdc8cc7b918f81c6395a48523079cccc89c7090b5c21c30ab62939fa8663cc695ad7d876f083773f7c85cffc5242
-
SSDEEP
24576:TwMryIYPOfPFxgvnRnc215nETdxUA6p7GDHDCf0uEywBk1EM8Xzd:Md5PsPfgvRv0gA6pYC52lD
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Executes dropped EXE 4 IoCs
pid Process 468 Process not Found 1960 alg.exe 912 aspnet_state.exe 1400 mscorsvw.exe -
Loads dropped DLL 1 IoCs
pid Process 468 Process not Found -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\System32\alg.exe PO_39100.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\a0a3a2b8826a969e.bin alg.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1716 set thread context of 2044 1716 PO_39100.exe 28 PID 2044 set thread context of 1760 2044 PO_39100.exe 30 -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe PO_39100.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe PO_39100.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.lock mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe PO_39100.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngenservicelock.dat mscorsvw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2044 PO_39100.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2044 PO_39100.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1716 wrote to memory of 2044 1716 PO_39100.exe 28 PID 1716 wrote to memory of 2044 1716 PO_39100.exe 28 PID 1716 wrote to memory of 2044 1716 PO_39100.exe 28 PID 1716 wrote to memory of 2044 1716 PO_39100.exe 28 PID 1716 wrote to memory of 2044 1716 PO_39100.exe 28 PID 1716 wrote to memory of 2044 1716 PO_39100.exe 28 PID 1716 wrote to memory of 2044 1716 PO_39100.exe 28 PID 1716 wrote to memory of 2044 1716 PO_39100.exe 28 PID 1716 wrote to memory of 2044 1716 PO_39100.exe 28 PID 2044 wrote to memory of 1760 2044 PO_39100.exe 30 PID 2044 wrote to memory of 1760 2044 PO_39100.exe 30 PID 2044 wrote to memory of 1760 2044 PO_39100.exe 30 PID 2044 wrote to memory of 1760 2044 PO_39100.exe 30 PID 2044 wrote to memory of 1760 2044 PO_39100.exe 30 PID 2044 wrote to memory of 1760 2044 PO_39100.exe 30 PID 2044 wrote to memory of 1760 2044 PO_39100.exe 30 PID 2044 wrote to memory of 1760 2044 PO_39100.exe 30 PID 2044 wrote to memory of 1760 2044 PO_39100.exe 30 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO_39100.exe"C:\Users\Admin\AppData\Local\Temp\PO_39100.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\PO_39100.exe"C:\Users\Admin\AppData\Local\Temp\PO_39100.exe"2⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe3⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:1760
-
-
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1960
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe1⤵
- Executes dropped EXE
PID:912
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1400
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD553b6bea93d5e4e1a93c4dfe4a5706d8f
SHA180d6e91242f3e91f3b78497d7f56652547d0e4c3
SHA256b9e60140cdbdab0acae26c9859ab141e729213682655c36ff522b8714760828a
SHA5128999725cff43f3a31c2c3d2473c182d4ee3e491379cae30d81fabd2d5993f28447961bddf117a061486237d2a57a91aac34441e4af68a7cf8651c529b7e1d4bf
-
Filesize
1.3MB
MD5224b1c38a76359c2fa803d076a53e46d
SHA1a6a7665ae9ddcbbf5b0b71129d7e0e071b6a5c8b
SHA256609e41aeafc844f8f837f3de903f06e5377d11fb87c2187538d87e2eac720527
SHA512f8827f732594bfb347339c32a90b5a31159ca493558affd4375a3240faa82fa125d48f09ff349ec969b5a9de6c950d78e53ac578ef6247242a81781fa471fec7
-
Filesize
1.3MB
MD5bcf320105a5dcace76eff1aa996e0689
SHA1a9594047dffc285379276f2b28514468aeb530c7
SHA2567f72217e47e1a864e45059a9145c2d361fbbb4d3e2f5d7a71ff2f2c3aea8db7b
SHA512e74f02f15d9e081ef42d711f06514cc138c54443e82f32f971488effe906ab965c356aacdeff00556881d1ae00a72b7ba93631777d11d09496e76b13ff72c06d
-
Filesize
1.3MB
MD553b6bea93d5e4e1a93c4dfe4a5706d8f
SHA180d6e91242f3e91f3b78497d7f56652547d0e4c3
SHA256b9e60140cdbdab0acae26c9859ab141e729213682655c36ff522b8714760828a
SHA5128999725cff43f3a31c2c3d2473c182d4ee3e491379cae30d81fabd2d5993f28447961bddf117a061486237d2a57a91aac34441e4af68a7cf8651c529b7e1d4bf
-
Filesize
1.3MB
MD5bcf320105a5dcace76eff1aa996e0689
SHA1a9594047dffc285379276f2b28514468aeb530c7
SHA2567f72217e47e1a864e45059a9145c2d361fbbb4d3e2f5d7a71ff2f2c3aea8db7b
SHA512e74f02f15d9e081ef42d711f06514cc138c54443e82f32f971488effe906ab965c356aacdeff00556881d1ae00a72b7ba93631777d11d09496e76b13ff72c06d