Analysis
-
max time kernel
237s -
max time network
315s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05-05-2023 18:51
Static task
static1
Behavioral task
behavioral1
Sample
Quote 1345 rev.3.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Quote 1345 rev.3.exe
Resource
win10v2004-20230220-en
General
-
Target
Quote 1345 rev.3.exe
-
Size
1.5MB
-
MD5
e2b30c0c90faeeb878ed21be152d2dc1
-
SHA1
b64e8bbd7d23f9585a7ff9b24a61a7ab119f1769
-
SHA256
90382d070f58dd0a9f21d05327c2589116e2271e2cce2cce69018e1f4d836c0f
-
SHA512
7126633aeaeaa91f08d5c0dce6129bfb7501287cad6ac106f1c64c2ab0cb010d3b870680047ea3e9dffdb3bfccab2a9d2a11f8057dd302dfaf140b34022bd74f
-
SSDEEP
24576:PnQ3GQdfKrh2G8uraReOgX1yFQ+5irxTCQJ5xvCwUXZMnKfJIxzN5b2K:P9QdIuWed+sKK+CQ5CwMZMnx0
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Executes dropped EXE 2 IoCs
pid Process 464 Process not Found 340 alg.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\System32\alg.exe Quote 1345 rev.3.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\360b1073826a969e.bin alg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 780 set thread context of 292 780 Quote 1345 rev.3.exe 27 -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe Quote 1345 rev.3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 292 Quote 1345 rev.3.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 292 Quote 1345 rev.3.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 780 wrote to memory of 292 780 Quote 1345 rev.3.exe 27 PID 780 wrote to memory of 292 780 Quote 1345 rev.3.exe 27 PID 780 wrote to memory of 292 780 Quote 1345 rev.3.exe 27 PID 780 wrote to memory of 292 780 Quote 1345 rev.3.exe 27 PID 780 wrote to memory of 292 780 Quote 1345 rev.3.exe 27 PID 780 wrote to memory of 292 780 Quote 1345 rev.3.exe 27 PID 780 wrote to memory of 292 780 Quote 1345 rev.3.exe 27 PID 780 wrote to memory of 292 780 Quote 1345 rev.3.exe 27 PID 780 wrote to memory of 292 780 Quote 1345 rev.3.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\Quote 1345 rev.3.exe"C:\Users\Admin\AppData\Local\Temp\Quote 1345 rev.3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Users\Admin\AppData\Local\Temp\Quote 1345 rev.3.exe"C:\Users\Admin\AppData\Local\Temp\Quote 1345 rev.3.exe"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:292 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe3⤵PID:1720
-
-
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:340
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5d633342eb3745e29f7cc936fdb830bce
SHA168b04cc397f147b01c00a8b9cf435e55b5252b33
SHA2564c1c14a8535ab8e57ff3abe8c1e8fd535445f3ea5da17d0e0d8d8b8acdbbe603
SHA5122ce4a459acc3d1c410b1db662a7a8a8826f98540a640d89c13e58089f8611cc8e7f940fbf0494e7ae460b50cdb4a19620384f121dd1c555dba843f05080ab98a
-
Filesize
1.3MB
MD5d633342eb3745e29f7cc936fdb830bce
SHA168b04cc397f147b01c00a8b9cf435e55b5252b33
SHA2564c1c14a8535ab8e57ff3abe8c1e8fd535445f3ea5da17d0e0d8d8b8acdbbe603
SHA5122ce4a459acc3d1c410b1db662a7a8a8826f98540a640d89c13e58089f8611cc8e7f940fbf0494e7ae460b50cdb4a19620384f121dd1c555dba843f05080ab98a