Analysis
-
max time kernel
143s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
10-05-2023 12:44
Static task
static1
Behavioral task
behavioral1
Sample
2fed0d020470afbcb42ea16cbedd103a50ccf86fa10f71252a8307de740c3b9d.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2fed0d020470afbcb42ea16cbedd103a50ccf86fa10f71252a8307de740c3b9d.exe
Resource
win10v2004-20230220-en
General
-
Target
2fed0d020470afbcb42ea16cbedd103a50ccf86fa10f71252a8307de740c3b9d.exe
-
Size
1.1MB
-
MD5
03ce9015af0ef971e98d2dba83a3afd6
-
SHA1
1cf9797ff0f5c61dbb7efa4c6ed3e5cd10bca40c
-
SHA256
2fed0d020470afbcb42ea16cbedd103a50ccf86fa10f71252a8307de740c3b9d
-
SHA512
7bff23a60fe8d6535a796a2f31398d333ca7bd0be84ba19c7c5c96af6c067b11fec94a648fc80fa442f4c96e79ad6e62e308c2086ce894296f86ae9941d9316b
-
SSDEEP
24576:DYSY2O/D45coTCaQkN4NUlPDYI5Qqu7JFZvJY:USDO/mcoCaQSl7A/9
Malware Config
Extracted
blustealer
Protocol: smtp- Host:
mail.adm.tools - Port:
587 - Username:
[email protected] - Password:
18iF5VUdC9xf
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Loads dropped DLL 2 IoCs
pid Process 760 vbc.exe 760 vbc.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 788 set thread context of 760 788 2fed0d020470afbcb42ea16cbedd103a50ccf86fa10f71252a8307de740c3b9d.exe 27 PID 760 set thread context of 616 760 vbc.exe 29 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 760 vbc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 760 vbc.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 788 wrote to memory of 760 788 2fed0d020470afbcb42ea16cbedd103a50ccf86fa10f71252a8307de740c3b9d.exe 27 PID 788 wrote to memory of 760 788 2fed0d020470afbcb42ea16cbedd103a50ccf86fa10f71252a8307de740c3b9d.exe 27 PID 788 wrote to memory of 760 788 2fed0d020470afbcb42ea16cbedd103a50ccf86fa10f71252a8307de740c3b9d.exe 27 PID 788 wrote to memory of 760 788 2fed0d020470afbcb42ea16cbedd103a50ccf86fa10f71252a8307de740c3b9d.exe 27 PID 788 wrote to memory of 760 788 2fed0d020470afbcb42ea16cbedd103a50ccf86fa10f71252a8307de740c3b9d.exe 27 PID 788 wrote to memory of 760 788 2fed0d020470afbcb42ea16cbedd103a50ccf86fa10f71252a8307de740c3b9d.exe 27 PID 788 wrote to memory of 760 788 2fed0d020470afbcb42ea16cbedd103a50ccf86fa10f71252a8307de740c3b9d.exe 27 PID 788 wrote to memory of 760 788 2fed0d020470afbcb42ea16cbedd103a50ccf86fa10f71252a8307de740c3b9d.exe 27 PID 788 wrote to memory of 760 788 2fed0d020470afbcb42ea16cbedd103a50ccf86fa10f71252a8307de740c3b9d.exe 27 PID 760 wrote to memory of 616 760 vbc.exe 29 PID 760 wrote to memory of 616 760 vbc.exe 29 PID 760 wrote to memory of 616 760 vbc.exe 29 PID 760 wrote to memory of 616 760 vbc.exe 29 PID 760 wrote to memory of 616 760 vbc.exe 29 PID 760 wrote to memory of 616 760 vbc.exe 29 PID 760 wrote to memory of 616 760 vbc.exe 29 PID 760 wrote to memory of 616 760 vbc.exe 29 PID 760 wrote to memory of 616 760 vbc.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2fed0d020470afbcb42ea16cbedd103a50ccf86fa10f71252a8307de740c3b9d.exe"C:\Users\Admin\AppData\Local\Temp\2fed0d020470afbcb42ea16cbedd103a50ccf86fa10f71252a8307de740c3b9d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\InstallUtil.exe3⤵PID:616
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD5d77b227a28a78627c2323cac75948390
SHA1e228c3951f2a9fd0febfe07390633ab4f35727f4
SHA256527ec201dcd7695bd9830eb82ab35a3986121de9ea156193834aed9d79223b82
SHA5125627fbc8bbb98f644e21f101a68f0e0b07b87c264d00ea227286bed8ab6dd4ebf5114f03b632604f775ff93666a409a1a179a81ebfc9246956ba8150ff5b0587
-
Filesize
31KB
MD5e91150a120a7d0b90c9541ddc35df2da
SHA18b218f7653cba01cd73a818de380e5b1018d1d40
SHA256e96c6c2d75c1af719909fac9cbf1a63441052c0acc5bfff8e53d663dd0d7ee89
SHA5123a796d7556799dee2bf2c0ee402b5ad39908ee2572f6e3a9dd78229d0f4e9d3f5236d0e1af08b6a0866189e219df03b0ed428a4b5dfb4ebdf585436615e66e28
-
Filesize
295KB
MD521765a296b37c1b074bc14316dc9d6cd
SHA1c99c541d528ad6defe78970e90361d86ad5fa6ae
SHA256c5a7d1d5f61a535aa511fc9b8119ff5103be48f97f89e123a138453c4aa5fc66
SHA5125d3392d0f9ee7ed8d9471375ff5333554ca80b7dbe436c2bacb42c1ffe8a5c687835d58ae8425029f83500f43c19268b3315a5c43edb12b707df367e6b86ea0a
-
Filesize
59KB
MD5d77b227a28a78627c2323cac75948390
SHA1e228c3951f2a9fd0febfe07390633ab4f35727f4
SHA256527ec201dcd7695bd9830eb82ab35a3986121de9ea156193834aed9d79223b82
SHA5125627fbc8bbb98f644e21f101a68f0e0b07b87c264d00ea227286bed8ab6dd4ebf5114f03b632604f775ff93666a409a1a179a81ebfc9246956ba8150ff5b0587
-
Filesize
585KB
MD55405413fff79b8d9c747aa900f60f082
SHA171caf8907ddd9a3a25d71356bd2ce09bd293bd78
SHA2563e5a28ffde07ac661c26b6ccf94e64c1c90b1f25b3b24c90605aa922b87642eb
SHA5122f09a30fc4da5166bd665210fefa1d44ce344f0ec6a37f127d677aeb3ca4fc0d09b7c9c1540f57da1e3449b7f588a1c61115395e965fa153d4baa5033266ed66