Analysis
-
max time kernel
297s -
max time network
262s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
09-06-2023 05:56
Static task
static1
Behavioral task
behavioral1
Sample
PURCHASE_ORDER INLINE 021010.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
PURCHASE_ORDER INLINE 021010.exe
Resource
win10v2004-20230221-en
General
-
Target
PURCHASE_ORDER INLINE 021010.exe
-
Size
57KB
-
MD5
f40a160dfddf79de154ad448c33c2e45
-
SHA1
6edf15758a6618a0e357cf220225c54c10f4fc9f
-
SHA256
ca43187a938211fe07ce02306e744c6c41b10fb12129d5e9b3c083a23541066f
-
SHA512
b3f3e333995c946f8902915919da0a0e01866c75f3df577b0706734a65dff783398c2a33876b5b07d8267f5b48eabb3bd1e31ef37ab49f4bf5322c3a0847b503
-
SSDEEP
1536:UwlxZCBDfbP7W71uMVV1GMeaDySRImGzaref9uT:UwlxZQfbP7WbV1xeuySRIm4ayf9uT
Malware Config
Extracted
blustealer
Protocol: smtp- Host:
mail.dphe.gov.bd - Port:
587 - Username:
[email protected] - Password:
@DphE20#
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation PURCHASE_ORDER INLINE 021010.exe -
Executes dropped EXE 1 IoCs
pid Process 4976 svchost.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "\"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\"" PURCHASE_ORDER INLINE 021010.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4976 set thread context of 232 4976 svchost.exe 94 PID 232 set thread context of 3652 232 jsc.exe 96 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3608 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1532 timeout.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 2680 PURCHASE_ORDER INLINE 021010.exe 2680 PURCHASE_ORDER INLINE 021010.exe 2680 PURCHASE_ORDER INLINE 021010.exe 2680 PURCHASE_ORDER INLINE 021010.exe 2680 PURCHASE_ORDER INLINE 021010.exe 2680 PURCHASE_ORDER INLINE 021010.exe 2680 PURCHASE_ORDER INLINE 021010.exe 2680 PURCHASE_ORDER INLINE 021010.exe 2680 PURCHASE_ORDER INLINE 021010.exe 2680 PURCHASE_ORDER INLINE 021010.exe 2680 PURCHASE_ORDER INLINE 021010.exe 2680 PURCHASE_ORDER INLINE 021010.exe 2680 PURCHASE_ORDER INLINE 021010.exe 2680 PURCHASE_ORDER INLINE 021010.exe 2680 PURCHASE_ORDER INLINE 021010.exe 2680 PURCHASE_ORDER INLINE 021010.exe 2680 PURCHASE_ORDER INLINE 021010.exe 2680 PURCHASE_ORDER INLINE 021010.exe 2680 PURCHASE_ORDER INLINE 021010.exe 2680 PURCHASE_ORDER INLINE 021010.exe 2680 PURCHASE_ORDER INLINE 021010.exe 2680 PURCHASE_ORDER INLINE 021010.exe 2680 PURCHASE_ORDER INLINE 021010.exe 4976 svchost.exe 4976 svchost.exe 4976 svchost.exe 4976 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2680 PURCHASE_ORDER INLINE 021010.exe Token: SeDebugPrivilege 4976 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 232 jsc.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2680 wrote to memory of 4460 2680 PURCHASE_ORDER INLINE 021010.exe 83 PID 2680 wrote to memory of 4460 2680 PURCHASE_ORDER INLINE 021010.exe 83 PID 2680 wrote to memory of 2640 2680 PURCHASE_ORDER INLINE 021010.exe 85 PID 2680 wrote to memory of 2640 2680 PURCHASE_ORDER INLINE 021010.exe 85 PID 4460 wrote to memory of 3608 4460 cmd.exe 87 PID 4460 wrote to memory of 3608 4460 cmd.exe 87 PID 2640 wrote to memory of 1532 2640 cmd.exe 88 PID 2640 wrote to memory of 1532 2640 cmd.exe 88 PID 2640 wrote to memory of 4976 2640 cmd.exe 89 PID 2640 wrote to memory of 4976 2640 cmd.exe 89 PID 4976 wrote to memory of 32 4976 svchost.exe 92 PID 4976 wrote to memory of 32 4976 svchost.exe 92 PID 4976 wrote to memory of 2188 4976 svchost.exe 93 PID 4976 wrote to memory of 2188 4976 svchost.exe 93 PID 4976 wrote to memory of 232 4976 svchost.exe 94 PID 4976 wrote to memory of 232 4976 svchost.exe 94 PID 4976 wrote to memory of 232 4976 svchost.exe 94 PID 4976 wrote to memory of 232 4976 svchost.exe 94 PID 4976 wrote to memory of 232 4976 svchost.exe 94 PID 4976 wrote to memory of 232 4976 svchost.exe 94 PID 4976 wrote to memory of 232 4976 svchost.exe 94 PID 4976 wrote to memory of 232 4976 svchost.exe 94 PID 232 wrote to memory of 3652 232 jsc.exe 96 PID 232 wrote to memory of 3652 232 jsc.exe 96 PID 232 wrote to memory of 3652 232 jsc.exe 96 PID 232 wrote to memory of 3652 232 jsc.exe 96 PID 232 wrote to memory of 3652 232 jsc.exe 96 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PURCHASE_ORDER INLINE 021010.exe"C:\Users\Admin\AppData\Local\Temp\PURCHASE_ORDER INLINE 021010.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'3⤵
- Creates scheduled task(s)
PID:3608
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp6E4F.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:1532
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe"4⤵PID:32
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe"4⤵PID:2188
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"4⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe5⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:3652
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151B
MD5c95b5f8881290eb3441582bda8d27a36
SHA12c9a68c30630f42a1824685e57357fda34da0cdc
SHA2563d307ea1aeb7448642eefb64bc980d8674da30585273728228f674792665dc3f
SHA51265947181294bc04a6af8805f6ab15cc1dc237d53c472973f11a5b1c72826c3fa9441ed89f0d8bcef4363b72b7685e81899f8104ce514ba516c7e97a59428bc2f
-
Filesize
57KB
MD5f40a160dfddf79de154ad448c33c2e45
SHA16edf15758a6618a0e357cf220225c54c10f4fc9f
SHA256ca43187a938211fe07ce02306e744c6c41b10fb12129d5e9b3c083a23541066f
SHA512b3f3e333995c946f8902915919da0a0e01866c75f3df577b0706734a65dff783398c2a33876b5b07d8267f5b48eabb3bd1e31ef37ab49f4bf5322c3a0847b503
-
Filesize
57KB
MD5f40a160dfddf79de154ad448c33c2e45
SHA16edf15758a6618a0e357cf220225c54c10f4fc9f
SHA256ca43187a938211fe07ce02306e744c6c41b10fb12129d5e9b3c083a23541066f
SHA512b3f3e333995c946f8902915919da0a0e01866c75f3df577b0706734a65dff783398c2a33876b5b07d8267f5b48eabb3bd1e31ef37ab49f4bf5322c3a0847b503