Analysis

  • max time kernel
    145s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-08-2023 09:16

General

  • Target

    92b2a58b647e00a887c4dba92d1e6d7ff4d50221ed19a618749305ce6be1c2ec.exe

  • Size

    427KB

  • MD5

    c84fa18b96495c6e841f4f51f13be99f

  • SHA1

    3f02e9012781268a287f82d0f172e62da50a8f06

  • SHA256

    92b2a58b647e00a887c4dba92d1e6d7ff4d50221ed19a618749305ce6be1c2ec

  • SHA512

    ca432eb5e54b4170616d791e31d3c0f46a7d30ff5756a78a471209b3a7cddddcc8d2003faed0b1d8599a29841659a6af0f7f2b8f70e5b17c9f115bbf31ba9d5d

  • SSDEEP

    12288:sWnxfgsRL4u/1AlLK6FRY2n8OPKxGvYmBcJ:3xgsRftD0C2nKGu

Score
10/10

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot6120911772:AAEvnEDbWRlbIuD1NP8MtmiY3tQ46T9SQyo/sendMessage?chat_id=6082430866

Signatures

  • BluStealer

    A Modular information stealer written in Visual Basic.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\92b2a58b647e00a887c4dba92d1e6d7ff4d50221ed19a618749305ce6be1c2ec.exe
    "C:\Users\Admin\AppData\Local\Temp\92b2a58b647e00a887c4dba92d1e6d7ff4d50221ed19a618749305ce6be1c2ec.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2764
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      2⤵
        PID:4880

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2764-133-0x0000000000400000-0x000000000046C9C0-memory.dmp

      Filesize

      434KB

    • memory/2764-151-0x0000000000400000-0x000000000046C9C0-memory.dmp

      Filesize

      434KB

    • memory/4880-136-0x0000000000D70000-0x0000000000DD6000-memory.dmp

      Filesize

      408KB

    • memory/4880-137-0x00000000746F0000-0x0000000074EA0000-memory.dmp

      Filesize

      7.7MB

    • memory/4880-138-0x00000000058A0000-0x00000000058B0000-memory.dmp

      Filesize

      64KB

    • memory/4880-139-0x00000000058B0000-0x000000000594C000-memory.dmp

      Filesize

      624KB

    • memory/4880-141-0x00000000746F0000-0x0000000074EA0000-memory.dmp

      Filesize

      7.7MB