Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
09-08-2023 17:41
Static task
static1
Behavioral task
behavioral1
Sample
hesaphareketi-01.pdf.js
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
hesaphareketi-01.pdf.js
Resource
win10v2004-20230703-en
General
-
Target
hesaphareketi-01.pdf.js
-
Size
410KB
-
MD5
bcb9093850861749082e61b189227937
-
SHA1
0af77c3cd52b18828eb1a77867ce05e05d5bc31b
-
SHA256
ba6268a4198e952cbf7f0cd2af1151207dd0271331069176394539011db32354
-
SHA512
ce52bdd09673a56d968f14ca5c25ffa7040c143045f582f00630720bfa3f29b24f45145c6374cd051052411846cc14cb6c2d6bce0715dbf9b0153ebbef4e91db
-
SSDEEP
6144:8Fo+/qDQ5e3ID89uFO1U0PZbXWDtZTuAMmoqME+NYloH:vh8uID8O0xbyZTxZOYQ
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5374342837:AAHF-c1HAIvNCdF89VuEdNggsL2YBlpgkSE/sendMessage?chat_id=2133303215
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral2/memory/2720-159-0x00000000001B0000-0x00000000001CA000-memory.dmp family_stormkitty -
Executes dropped EXE 2 IoCs
pid Process 3796 hesaphareketi-01.pdf.exe 384 hesaphareketi-01.pdf.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 14 icanhazip.com -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3796 set thread context of 384 3796 hesaphareketi-01.pdf.exe 83 PID 384 set thread context of 2720 384 hesaphareketi-01.pdf.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2720 AppLaunch.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 384 hesaphareketi-01.pdf.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1176 wrote to memory of 3796 1176 wscript.exe 82 PID 1176 wrote to memory of 3796 1176 wscript.exe 82 PID 1176 wrote to memory of 3796 1176 wscript.exe 82 PID 3796 wrote to memory of 384 3796 hesaphareketi-01.pdf.exe 83 PID 3796 wrote to memory of 384 3796 hesaphareketi-01.pdf.exe 83 PID 3796 wrote to memory of 384 3796 hesaphareketi-01.pdf.exe 83 PID 3796 wrote to memory of 384 3796 hesaphareketi-01.pdf.exe 83 PID 3796 wrote to memory of 384 3796 hesaphareketi-01.pdf.exe 83 PID 3796 wrote to memory of 384 3796 hesaphareketi-01.pdf.exe 83 PID 3796 wrote to memory of 384 3796 hesaphareketi-01.pdf.exe 83 PID 3796 wrote to memory of 384 3796 hesaphareketi-01.pdf.exe 83 PID 384 wrote to memory of 2720 384 hesaphareketi-01.pdf.exe 86 PID 384 wrote to memory of 2720 384 hesaphareketi-01.pdf.exe 86 PID 384 wrote to memory of 2720 384 hesaphareketi-01.pdf.exe 86 PID 384 wrote to memory of 2720 384 hesaphareketi-01.pdf.exe 86 PID 384 wrote to memory of 2720 384 hesaphareketi-01.pdf.exe 86
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\hesaphareketi-01.pdf.js1⤵
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\hesaphareketi-01.pdf.exe"C:\Users\Admin\AppData\Local\Temp\hesaphareketi-01.pdf.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Users\Admin\AppData\Local\Temp\hesaphareketi-01.pdf.exe"C:\Users\Admin\AppData\Local\Temp\hesaphareketi-01.pdf.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD52c3fbb2cee9b79530534e53064ff68a2
SHA10f8a016173e7202ec2abe46ae038016fcd1b7742
SHA2560107b32e98dba4ef3826e16bd3d5e03a8b277a5bfe9bd20c5ee110596cf00f07
SHA512d605dcef74eba2509d171b7853b95595d2166f0001974d25716b52a790939e0b3b563efb14d336c6eefdf8adf52f3f4a56782eb037ec31f4d8c7515b0bfd78ec
-
Filesize
307KB
MD52c3fbb2cee9b79530534e53064ff68a2
SHA10f8a016173e7202ec2abe46ae038016fcd1b7742
SHA2560107b32e98dba4ef3826e16bd3d5e03a8b277a5bfe9bd20c5ee110596cf00f07
SHA512d605dcef74eba2509d171b7853b95595d2166f0001974d25716b52a790939e0b3b563efb14d336c6eefdf8adf52f3f4a56782eb037ec31f4d8c7515b0bfd78ec
-
Filesize
307KB
MD52c3fbb2cee9b79530534e53064ff68a2
SHA10f8a016173e7202ec2abe46ae038016fcd1b7742
SHA2560107b32e98dba4ef3826e16bd3d5e03a8b277a5bfe9bd20c5ee110596cf00f07
SHA512d605dcef74eba2509d171b7853b95595d2166f0001974d25716b52a790939e0b3b563efb14d336c6eefdf8adf52f3f4a56782eb037ec31f4d8c7515b0bfd78ec
-
Filesize
307KB
MD52c3fbb2cee9b79530534e53064ff68a2
SHA10f8a016173e7202ec2abe46ae038016fcd1b7742
SHA2560107b32e98dba4ef3826e16bd3d5e03a8b277a5bfe9bd20c5ee110596cf00f07
SHA512d605dcef74eba2509d171b7853b95595d2166f0001974d25716b52a790939e0b3b563efb14d336c6eefdf8adf52f3f4a56782eb037ec31f4d8c7515b0bfd78ec