Analysis
-
max time kernel
150s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-06-2023 11:29
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Refrence Order.exe
Resource
win7-20230220-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
Refrence Order.exe
Resource
win10v2004-20230220-en
windows10-2004-x64
10 signatures
150 seconds
General
-
Target
Refrence Order.exe
-
Size
22KB
-
MD5
bb639f8c81d9cf4a49e72015d7c75735
-
SHA1
91d717df3b5a1b833a60b5e2eb4d8f1c10555c62
-
SHA256
24c162c82ab104894354b4869e0f44ca289ae06b535827a7aefc08982effd2c9
-
SHA512
59b7137c0ef51746057b5dfd8ff09168a63e120898711914e7acb67393c109808ec73b77a56265de74b48e11ddc8ab4a81115e9c9435ebe019ec2a48eedad7f1
-
SSDEEP
384:TPHG946aVb9BezNZUG9bxcJ4SKKpK+dwQQC9EOAtFgyl8j3Bl//9NKa2HovbzOvp:jvV5vfDJHjRj3BxVTWJ1w3tXqSK
Score
10/10
Malware Config
Extracted
Family
blustealer
Credentials
Protocol: smtp- Host:
mail.dphe.gov.bd - Port:
587 - Username:
[email protected] - Password:
@DphE20#
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4640 set thread context of 2460 4640 Refrence Order.exe 108 PID 2460 set thread context of 3724 2460 jsc.exe 109 -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 4640 Refrence Order.exe 4640 Refrence Order.exe 4640 Refrence Order.exe 4640 Refrence Order.exe 4640 Refrence Order.exe 4640 Refrence Order.exe 4640 Refrence Order.exe 4640 Refrence Order.exe 4640 Refrence Order.exe 4640 Refrence Order.exe 4640 Refrence Order.exe 4640 Refrence Order.exe 4640 Refrence Order.exe 4640 Refrence Order.exe 4640 Refrence Order.exe 4640 Refrence Order.exe 4640 Refrence Order.exe 4640 Refrence Order.exe 4640 Refrence Order.exe 4640 Refrence Order.exe 4640 Refrence Order.exe 4640 Refrence Order.exe 4640 Refrence Order.exe 4640 Refrence Order.exe 4640 Refrence Order.exe 4640 Refrence Order.exe 4640 Refrence Order.exe 4640 Refrence Order.exe 4640 Refrence Order.exe 4640 Refrence Order.exe 4640 Refrence Order.exe 4640 Refrence Order.exe 4640 Refrence Order.exe 4640 Refrence Order.exe 4640 Refrence Order.exe 4640 Refrence Order.exe 4640 Refrence Order.exe 4640 Refrence Order.exe 4640 Refrence Order.exe 4640 Refrence Order.exe 4640 Refrence Order.exe 4640 Refrence Order.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4640 Refrence Order.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2460 jsc.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 4640 wrote to memory of 2912 4640 Refrence Order.exe 87 PID 4640 wrote to memory of 2912 4640 Refrence Order.exe 87 PID 4640 wrote to memory of 1544 4640 Refrence Order.exe 88 PID 4640 wrote to memory of 1544 4640 Refrence Order.exe 88 PID 4640 wrote to memory of 1560 4640 Refrence Order.exe 89 PID 4640 wrote to memory of 1560 4640 Refrence Order.exe 89 PID 4640 wrote to memory of 1924 4640 Refrence Order.exe 90 PID 4640 wrote to memory of 1924 4640 Refrence Order.exe 90 PID 4640 wrote to memory of 1924 4640 Refrence Order.exe 90 PID 4640 wrote to memory of 452 4640 Refrence Order.exe 91 PID 4640 wrote to memory of 452 4640 Refrence Order.exe 91 PID 4640 wrote to memory of 3220 4640 Refrence Order.exe 92 PID 4640 wrote to memory of 3220 4640 Refrence Order.exe 92 PID 4640 wrote to memory of 3300 4640 Refrence Order.exe 93 PID 4640 wrote to memory of 3300 4640 Refrence Order.exe 93 PID 4640 wrote to memory of 4000 4640 Refrence Order.exe 94 PID 4640 wrote to memory of 4000 4640 Refrence Order.exe 94 PID 4640 wrote to memory of 3620 4640 Refrence Order.exe 95 PID 4640 wrote to memory of 3620 4640 Refrence Order.exe 95 PID 4640 wrote to memory of 3164 4640 Refrence Order.exe 96 PID 4640 wrote to memory of 3164 4640 Refrence Order.exe 96 PID 4640 wrote to memory of 2676 4640 Refrence Order.exe 97 PID 4640 wrote to memory of 2676 4640 Refrence Order.exe 97 PID 4640 wrote to memory of 320 4640 Refrence Order.exe 98 PID 4640 wrote to memory of 320 4640 Refrence Order.exe 98 PID 4640 wrote to memory of 224 4640 Refrence Order.exe 99 PID 4640 wrote to memory of 224 4640 Refrence Order.exe 99 PID 4640 wrote to memory of 208 4640 Refrence Order.exe 100 PID 4640 wrote to memory of 208 4640 Refrence Order.exe 100 PID 4640 wrote to memory of 100 4640 Refrence Order.exe 101 PID 4640 wrote to memory of 100 4640 Refrence Order.exe 101 PID 4640 wrote to memory of 4748 4640 Refrence Order.exe 102 PID 4640 wrote to memory of 4748 4640 Refrence Order.exe 102 PID 4640 wrote to memory of 4412 4640 Refrence Order.exe 103 PID 4640 wrote to memory of 4412 4640 Refrence Order.exe 103 PID 4640 wrote to memory of 4488 4640 Refrence Order.exe 104 PID 4640 wrote to memory of 4488 4640 Refrence Order.exe 104 PID 4640 wrote to memory of 3060 4640 Refrence Order.exe 105 PID 4640 wrote to memory of 3060 4640 Refrence Order.exe 105 PID 4640 wrote to memory of 1768 4640 Refrence Order.exe 106 PID 4640 wrote to memory of 1768 4640 Refrence Order.exe 106 PID 4640 wrote to memory of 3540 4640 Refrence Order.exe 107 PID 4640 wrote to memory of 3540 4640 Refrence Order.exe 107 PID 4640 wrote to memory of 2460 4640 Refrence Order.exe 108 PID 4640 wrote to memory of 2460 4640 Refrence Order.exe 108 PID 4640 wrote to memory of 2460 4640 Refrence Order.exe 108 PID 4640 wrote to memory of 2460 4640 Refrence Order.exe 108 PID 4640 wrote to memory of 2460 4640 Refrence Order.exe 108 PID 4640 wrote to memory of 2460 4640 Refrence Order.exe 108 PID 4640 wrote to memory of 2460 4640 Refrence Order.exe 108 PID 4640 wrote to memory of 2460 4640 Refrence Order.exe 108 PID 2460 wrote to memory of 3724 2460 jsc.exe 109 PID 2460 wrote to memory of 3724 2460 jsc.exe 109 PID 2460 wrote to memory of 3724 2460 jsc.exe 109 PID 2460 wrote to memory of 3724 2460 jsc.exe 109 PID 2460 wrote to memory of 3724 2460 jsc.exe 109 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Refrence Order.exe"C:\Users\Admin\AppData\Local\Temp\Refrence Order.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe"2⤵PID:2912
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"2⤵PID:1544
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe"2⤵PID:1560
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"2⤵PID:1924
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"2⤵PID:452
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"2⤵PID:3220
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe"2⤵PID:3300
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe"2⤵PID:4000
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe"2⤵PID:3620
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe"2⤵PID:3164
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe"2⤵PID:2676
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe"2⤵PID:320
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"2⤵PID:224
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe"2⤵PID:208
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"2⤵PID:100
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe"2⤵PID:4748
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe"2⤵PID:4412
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe"2⤵PID:4488
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe"2⤵PID:3060
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe"2⤵PID:1768
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe"2⤵PID:3540
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe3⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:3724
-
-