Analysis
-
max time kernel
144s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
27-06-2023 17:22
Static task
static1
Behavioral task
behavioral1
Sample
Draft BL.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
Draft BL.exe
Resource
win10v2004-20230621-en
General
-
Target
Draft BL.exe
-
Size
823KB
-
MD5
ad39b3a11ed93999ec47bb2004822923
-
SHA1
a91442c5fc2a806f2a73110d761f3c2d0923d694
-
SHA256
642788b753c8802d30666e5d6d2a2e4c9d810583e3af7fcb2983dd219c4526e7
-
SHA512
839c6a08742c094f8d972300c74e422c93b09082aa512e63e85ae6f4d769c59e09d5c4313ea5f189095dbb257cea32b23785f99efaef40a7ec8692907ca742c6
-
SSDEEP
24576:GPPBLdk29XW6to9ejUKAQLSiXX/i/SUm:G/LXWexYLqfmSUm
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5450700540:AAEJyEEV8BKgYUKmnCPZxp19kD9GVSRup5M/sendMessage?chat_id=5422342474
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-508929744-1894537824-211734425-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-508929744-1894537824-211734425-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-508929744-1894537824-211734425-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1520 set thread context of 1756 1520 Draft BL.exe 88 PID 1756 set thread context of 3120 1756 Draft BL.exe 89 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 39 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1520 Draft BL.exe 1520 Draft BL.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1520 Draft BL.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1756 Draft BL.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1520 wrote to memory of 2168 1520 Draft BL.exe 87 PID 1520 wrote to memory of 2168 1520 Draft BL.exe 87 PID 1520 wrote to memory of 2168 1520 Draft BL.exe 87 PID 1520 wrote to memory of 1756 1520 Draft BL.exe 88 PID 1520 wrote to memory of 1756 1520 Draft BL.exe 88 PID 1520 wrote to memory of 1756 1520 Draft BL.exe 88 PID 1520 wrote to memory of 1756 1520 Draft BL.exe 88 PID 1520 wrote to memory of 1756 1520 Draft BL.exe 88 PID 1520 wrote to memory of 1756 1520 Draft BL.exe 88 PID 1520 wrote to memory of 1756 1520 Draft BL.exe 88 PID 1520 wrote to memory of 1756 1520 Draft BL.exe 88 PID 1756 wrote to memory of 3120 1756 Draft BL.exe 89 PID 1756 wrote to memory of 3120 1756 Draft BL.exe 89 PID 1756 wrote to memory of 3120 1756 Draft BL.exe 89 PID 1756 wrote to memory of 3120 1756 Draft BL.exe 89 PID 1756 wrote to memory of 3120 1756 Draft BL.exe 89 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-508929744-1894537824-211734425-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-508929744-1894537824-211734425-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Draft BL.exe"C:\Users\Admin\AppData\Local\Temp\Draft BL.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\Draft BL.exe"C:\Users\Admin\AppData\Local\Temp\Draft BL.exe"2⤵PID:2168
-
-
C:\Users\Admin\AppData\Local\Temp\Draft BL.exe"C:\Users\Admin\AppData\Local\Temp\Draft BL.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe3⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:3120
-
-