Analysis

  • max time kernel
    150s
  • max time network
    108s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-06-2023 11:29

General

  • Target

    Refrence Order.exe

  • Size

    22KB

  • MD5

    bb639f8c81d9cf4a49e72015d7c75735

  • SHA1

    91d717df3b5a1b833a60b5e2eb4d8f1c10555c62

  • SHA256

    24c162c82ab104894354b4869e0f44ca289ae06b535827a7aefc08982effd2c9

  • SHA512

    59b7137c0ef51746057b5dfd8ff09168a63e120898711914e7acb67393c109808ec73b77a56265de74b48e11ddc8ab4a81115e9c9435ebe019ec2a48eedad7f1

  • SSDEEP

    384:TPHG946aVb9BezNZUG9bxcJ4SKKpK+dwQQC9EOAtFgyl8j3Bl//9NKa2HovbzOvp:jvV5vfDJHjRj3BxVTWJ1w3tXqSK

Malware Config

Extracted

Family

blustealer

Credentials

  • Protocol:
    smtp
  • Host:
    mail.dphe.gov.bd
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    @DphE20#

Signatures

  • BluStealer

    A Modular information stealer written in Visual Basic.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 42 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Refrence Order.exe
    "C:\Users\Admin\AppData\Local\Temp\Refrence Order.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4640
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe"
      2⤵
        PID:2912
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe
        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"
        2⤵
          PID:1544
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe
          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe"
          2⤵
            PID:1560
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"
            2⤵
              PID:1924
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"
              2⤵
                PID:452
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"
                2⤵
                  PID:3220
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe"
                  2⤵
                    PID:3300
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
                    "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe"
                    2⤵
                      PID:4000
                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe"
                      2⤵
                        PID:3620
                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe
                        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe"
                        2⤵
                          PID:3164
                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe"
                          2⤵
                            PID:2676
                          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe
                            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe"
                            2⤵
                              PID:320
                            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe
                              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"
                              2⤵
                                PID:224
                              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe
                                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe"
                                2⤵
                                  PID:208
                                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe
                                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"
                                  2⤵
                                    PID:100
                                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe
                                    "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe"
                                    2⤵
                                      PID:4748
                                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe
                                      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe"
                                      2⤵
                                        PID:4412
                                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe
                                        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe"
                                        2⤵
                                          PID:4488
                                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe
                                          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe"
                                          2⤵
                                            PID:3060
                                          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe
                                            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe"
                                            2⤵
                                              PID:1768
                                            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe
                                              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe"
                                              2⤵
                                                PID:3540
                                              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe
                                                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"
                                                2⤵
                                                • Suspicious use of SetThreadContext
                                                • Suspicious use of SetWindowsHookEx
                                                • Suspicious use of WriteProcessMemory
                                                PID:2460
                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                                                  3⤵
                                                  • Accesses Microsoft Outlook profiles
                                                  • outlook_office_path
                                                  • outlook_win_path
                                                  PID:3724

                                            Network

                                            MITRE ATT&CK Enterprise v6

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • memory/2460-136-0x0000000000400000-0x000000000046D000-memory.dmp

                                              Filesize

                                              436KB

                                            • memory/2460-139-0x0000000000400000-0x000000000046D000-memory.dmp

                                              Filesize

                                              436KB

                                            • memory/2460-142-0x0000000000400000-0x000000000046D000-memory.dmp

                                              Filesize

                                              436KB

                                            • memory/2460-146-0x0000000000400000-0x000000000046D000-memory.dmp

                                              Filesize

                                              436KB

                                            • memory/3724-143-0x0000000000B60000-0x0000000000BC6000-memory.dmp

                                              Filesize

                                              408KB

                                            • memory/3724-144-0x0000000005640000-0x00000000056DC000-memory.dmp

                                              Filesize

                                              624KB

                                            • memory/4640-133-0x000001EB506B0000-0x000001EB506BA000-memory.dmp

                                              Filesize

                                              40KB

                                            • memory/4640-134-0x000001EB6B010000-0x000001EB6B538000-memory.dmp

                                              Filesize

                                              5.2MB

                                            • memory/4640-135-0x000001EB6AAB0000-0x000001EB6AAC0000-memory.dmp

                                              Filesize

                                              64KB