Analysis
-
max time kernel
233s -
max time network
326s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
07-05-2023 02:08
Static task
static1
Behavioral task
behavioral1
Sample
693c258cb5620f7e8714d4afc7215e2c7dc16872265148341db23b639906eecb.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
693c258cb5620f7e8714d4afc7215e2c7dc16872265148341db23b639906eecb.exe
Resource
win10v2004-20230220-en
General
-
Target
693c258cb5620f7e8714d4afc7215e2c7dc16872265148341db23b639906eecb.exe
-
Size
1.5MB
-
MD5
ebf99fc11603d1ec4706b4330761df32
-
SHA1
c560ca5ae10593d7861701654d839d1071515866
-
SHA256
693c258cb5620f7e8714d4afc7215e2c7dc16872265148341db23b639906eecb
-
SHA512
d31c699f201343bd02c07bbf5d41e00df8368b81bfbb1d037fb4b1e1894fd3b8232e80b065845745fa6dab7f23d47efbb1d8b6a9143f5b7db0fb4a57395c4f4a
-
SSDEEP
49152:NQh9Nn3uFcWIY2YZGIUtNlMpovD2i9c2:0/37Wp2YPUtNlMG7N
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Executes dropped EXE 2 IoCs
pid Process 464 Process not Found 432 alg.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\System32\alg.exe 693c258cb5620f7e8714d4afc7215e2c7dc16872265148341db23b639906eecb.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\a1084ae6826a969e.bin alg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1152 set thread context of 1752 1152 693c258cb5620f7e8714d4afc7215e2c7dc16872265148341db23b639906eecb.exe 28 -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe 693c258cb5620f7e8714d4afc7215e2c7dc16872265148341db23b639906eecb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1752 693c258cb5620f7e8714d4afc7215e2c7dc16872265148341db23b639906eecb.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1752 693c258cb5620f7e8714d4afc7215e2c7dc16872265148341db23b639906eecb.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1152 wrote to memory of 1752 1152 693c258cb5620f7e8714d4afc7215e2c7dc16872265148341db23b639906eecb.exe 28 PID 1152 wrote to memory of 1752 1152 693c258cb5620f7e8714d4afc7215e2c7dc16872265148341db23b639906eecb.exe 28 PID 1152 wrote to memory of 1752 1152 693c258cb5620f7e8714d4afc7215e2c7dc16872265148341db23b639906eecb.exe 28 PID 1152 wrote to memory of 1752 1152 693c258cb5620f7e8714d4afc7215e2c7dc16872265148341db23b639906eecb.exe 28 PID 1152 wrote to memory of 1752 1152 693c258cb5620f7e8714d4afc7215e2c7dc16872265148341db23b639906eecb.exe 28 PID 1152 wrote to memory of 1752 1152 693c258cb5620f7e8714d4afc7215e2c7dc16872265148341db23b639906eecb.exe 28 PID 1152 wrote to memory of 1752 1152 693c258cb5620f7e8714d4afc7215e2c7dc16872265148341db23b639906eecb.exe 28 PID 1152 wrote to memory of 1752 1152 693c258cb5620f7e8714d4afc7215e2c7dc16872265148341db23b639906eecb.exe 28 PID 1152 wrote to memory of 1752 1152 693c258cb5620f7e8714d4afc7215e2c7dc16872265148341db23b639906eecb.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\693c258cb5620f7e8714d4afc7215e2c7dc16872265148341db23b639906eecb.exe"C:\Users\Admin\AppData\Local\Temp\693c258cb5620f7e8714d4afc7215e2c7dc16872265148341db23b639906eecb.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\693c258cb5620f7e8714d4afc7215e2c7dc16872265148341db23b639906eecb.exe"C:\Users\Admin\AppData\Local\Temp\693c258cb5620f7e8714d4afc7215e2c7dc16872265148341db23b639906eecb.exe"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1752 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe3⤵PID:808
-
-
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:432
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD574d0b268b3815961973a2e9ee14bc0d7
SHA1d798937e298ea637b70fa250027244861ad1c582
SHA256c58de118d594a0b43cceca813eff318d823b8d98e9e5adba6a6ad51b5551515b
SHA512df9fe872a7dcd309d525c4eaa9efd2e707ee55bc804a0af982720cba67beaf4b578adc65197b75f5e0652652b9ebc72457a405d8c14f5ae43ac5b47b91ec9236
-
Filesize
1.3MB
MD574d0b268b3815961973a2e9ee14bc0d7
SHA1d798937e298ea637b70fa250027244861ad1c582
SHA256c58de118d594a0b43cceca813eff318d823b8d98e9e5adba6a6ad51b5551515b
SHA512df9fe872a7dcd309d525c4eaa9efd2e707ee55bc804a0af982720cba67beaf4b578adc65197b75f5e0652652b9ebc72457a405d8c14f5ae43ac5b47b91ec9236