Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
14-08-2023 15:24
Static task
static1
Behavioral task
behavioral1
Sample
Product Spec.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Product Spec.exe
Resource
win10v2004-20230703-en
General
-
Target
Product Spec.exe
-
Size
112KB
-
MD5
d59c27e2eb8d505a78b0d57801750df5
-
SHA1
947335b0768c0e6c63d6b3185785ebbe71538511
-
SHA256
d8dc20517ab9336ee7bbfee1416a5c6ec0cb2cf63400c803858c7c1db4f4f837
-
SHA512
b3a568be8db5d6edf098a7157cb53782e84efcc81ed8ba5cf0f5ee60e51dccc0343bff580c2c066c95a61ba2c1656819b4b52b3974de44e4531518b972ab3842
-
SSDEEP
1536:AiiHA0C/fLKpoTNxrNnubIq59PdTvdl5PAaZ/Sv93Q28FHDd:NiiLKpS/Ni59P1tfhAP8tDd
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5518827253:AAGOg42FA-LTJl6MOuvPuukxFyV4dUBJ5rM/sendMessage?chat_id=1223462240
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Euxqnrcx = "C:\\Users\\Admin\\AppData\\Roaming\\Euxqnrcx.exe" Product Spec.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2700 set thread context of 2560 2700 Product Spec.exe 89 PID 2560 set thread context of 1612 2560 MSBuild.exe 90 -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 92 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2700 Product Spec.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2560 MSBuild.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2700 wrote to memory of 2560 2700 Product Spec.exe 89 PID 2700 wrote to memory of 2560 2700 Product Spec.exe 89 PID 2700 wrote to memory of 2560 2700 Product Spec.exe 89 PID 2700 wrote to memory of 2560 2700 Product Spec.exe 89 PID 2700 wrote to memory of 2560 2700 Product Spec.exe 89 PID 2700 wrote to memory of 2560 2700 Product Spec.exe 89 PID 2700 wrote to memory of 2560 2700 Product Spec.exe 89 PID 2700 wrote to memory of 2560 2700 Product Spec.exe 89 PID 2560 wrote to memory of 1612 2560 MSBuild.exe 90 PID 2560 wrote to memory of 1612 2560 MSBuild.exe 90 PID 2560 wrote to memory of 1612 2560 MSBuild.exe 90 PID 2560 wrote to memory of 1612 2560 MSBuild.exe 90 PID 2560 wrote to memory of 1612 2560 MSBuild.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\Product Spec.exe"C:\Users\Admin\AppData\Local\Temp\Product Spec.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe3⤵PID:1612
-
-