Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    07-08-2023 09:24

General

  • Target

    92b2a58b647e00a887c4dba92d1e6d7ff4d50221ed19a618749305ce6be1c2ec.exe

  • Size

    427KB

  • MD5

    c84fa18b96495c6e841f4f51f13be99f

  • SHA1

    3f02e9012781268a287f82d0f172e62da50a8f06

  • SHA256

    92b2a58b647e00a887c4dba92d1e6d7ff4d50221ed19a618749305ce6be1c2ec

  • SHA512

    ca432eb5e54b4170616d791e31d3c0f46a7d30ff5756a78a471209b3a7cddddcc8d2003faed0b1d8599a29841659a6af0f7f2b8f70e5b17c9f115bbf31ba9d5d

  • SSDEEP

    12288:sWnxfgsRL4u/1AlLK6FRY2n8OPKxGvYmBcJ:3xgsRftD0C2nKGu

Score
10/10

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot6120911772:AAEvnEDbWRlbIuD1NP8MtmiY3tQ46T9SQyo/sendMessage?chat_id=6082430866

Signatures

  • BluStealer

    A Modular information stealer written in Visual Basic.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\92b2a58b647e00a887c4dba92d1e6d7ff4d50221ed19a618749305ce6be1c2ec.exe
    "C:\Users\Admin\AppData\Local\Temp\92b2a58b647e00a887c4dba92d1e6d7ff4d50221ed19a618749305ce6be1c2ec.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2568
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      2⤵
        PID:2064

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2064-57-0x00000000001D0000-0x0000000000236000-memory.dmp

      Filesize

      408KB

    • memory/2064-58-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

      Filesize

      4KB

    • memory/2064-59-0x00000000001D0000-0x0000000000236000-memory.dmp

      Filesize

      408KB

    • memory/2064-61-0x00000000001D0000-0x0000000000236000-memory.dmp

      Filesize

      408KB

    • memory/2064-63-0x00000000001D0000-0x0000000000236000-memory.dmp

      Filesize

      408KB

    • memory/2064-64-0x0000000074610000-0x0000000074CFE000-memory.dmp

      Filesize

      6.9MB

    • memory/2064-65-0x0000000000600000-0x0000000000640000-memory.dmp

      Filesize

      256KB

    • memory/2064-66-0x0000000004850000-0x000000000490C000-memory.dmp

      Filesize

      752KB

    • memory/2064-67-0x0000000074610000-0x0000000074CFE000-memory.dmp

      Filesize

      6.9MB

    • memory/2568-54-0x0000000000400000-0x000000000046C9C0-memory.dmp

      Filesize

      434KB

    • memory/2568-68-0x0000000000400000-0x000000000046C9C0-memory.dmp

      Filesize

      434KB