Analysis
-
max time kernel
153s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
05-01-2024 23:59
Static task
static1
Behavioral task
behavioral1
Sample
44c401c50cdbecf5f20fffd60e48628f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
44c401c50cdbecf5f20fffd60e48628f.exe
Resource
win10v2004-20231215-en
General
-
Target
44c401c50cdbecf5f20fffd60e48628f.exe
-
Size
299KB
-
MD5
44c401c50cdbecf5f20fffd60e48628f
-
SHA1
6ba74f52e4e774f5762e99d7f49cc787f28353d4
-
SHA256
e6407a39f1b2fb728a40612d6ca8e71d6dc004d9efb569f2f4d351ab693ac6f4
-
SHA512
ae385fe48068210b45075d1b2433bb3606766f2e6fc17d9c14582040f2f2b64f411e1bcd29facc16fa59243987d894c7a084a573db032909e68a8d977d5108f3
-
SSDEEP
6144:LWlg4qQdWyIAvEZ023cZ05Pi+xPwIwWFvAKbmWJI8xF7+Or:LQzAyIAvP7iwWyKb1+GqOr
Malware Config
Extracted
blustealer
Protocol: smtp- Host:
mail.dm-teh.com - Port:
587 - Username:
[email protected] - Password:
Vm@(O;CO.vEQ
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Executes dropped EXE 1 IoCs
pid Process 4956 PASSWORDSNET4.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PASSWORDSNET4.exe Key opened \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PASSWORDSNET4.exe Key opened \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PASSWORDSNET4.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1648 set thread context of 3772 1648 44c401c50cdbecf5f20fffd60e48628f.exe 88 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 PASSWORDSNET4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier PASSWORDSNET4.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1648 44c401c50cdbecf5f20fffd60e48628f.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3772 44c401c50cdbecf5f20fffd60e48628f.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3772 44c401c50cdbecf5f20fffd60e48628f.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1648 wrote to memory of 3772 1648 44c401c50cdbecf5f20fffd60e48628f.exe 88 PID 1648 wrote to memory of 3772 1648 44c401c50cdbecf5f20fffd60e48628f.exe 88 PID 1648 wrote to memory of 3772 1648 44c401c50cdbecf5f20fffd60e48628f.exe 88 PID 1648 wrote to memory of 3772 1648 44c401c50cdbecf5f20fffd60e48628f.exe 88 PID 3772 wrote to memory of 4956 3772 44c401c50cdbecf5f20fffd60e48628f.exe 92 PID 3772 wrote to memory of 4956 3772 44c401c50cdbecf5f20fffd60e48628f.exe 92 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PASSWORDSNET4.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PASSWORDSNET4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\44c401c50cdbecf5f20fffd60e48628f.exe"C:\Users\Admin\AppData\Local\Temp\44c401c50cdbecf5f20fffd60e48628f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\44c401c50cdbecf5f20fffd60e48628f.exe"C:\Users\Admin\AppData\Local\Temp\44c401c50cdbecf5f20fffd60e48628f.exe"2⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\NET4\PASSWORDSNET4.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\NET4\PASSWORDSNET4.exe3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- outlook_office_path
- outlook_win_path
PID:4956
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
122KB
MD537ac88bc53abcc353b3a93f68fb30871
SHA1f5165c03b5de33db3704d502227bac35eae1c6c5
SHA2567bc03158a3c0bcb001093d9d40eaf6b9a7adf14e685db68fbd9d0f135d447ebe
SHA51201c65cbf90c2db90d0563d4a45650d4abd19e1a90bb8467f0e5a57ff1c6c377e3be8216f3324b81af58822b75a22b52f7317df985c11f3a7a45b72843134fc38
-
Filesize
525B
MD56dff769418d85d1be525b6e38f6291a7
SHA14c73fb851985f909947c49115290dbad960d2dcf
SHA25610ce5b7e904bb54d120bf84610b4b716392e145c75555fc7f494c514db2453db
SHA51265222d1d4ddde8439d6de7e75650af44a0fdf0581d0bfa95bcb37fcf35565b0a37f8895bb551983f2370e97489b2940bdf667f674cb175fd1a8511256619becd
-
Filesize
24B
MD598a833e15d18697e8e56cdafb0642647
SHA1e5f94d969899646a3d4635f28a7cd9dd69705887
SHA256ff006c86b5ec033fe3cafd759bf75be00e50c375c75157e99c0c5d39c96a2a6c
SHA512c6f9a09d9707b770dbc10d47c4d9b949f4ebf5f030b5ef8c511b635c32d418ad25d72eee5d7ed02a96aeb8bf2c85491ca1aa0e4336d242793c886ed1bcdd910b
-
Filesize
156KB
MD50c3c728a9b4376e014bc97f7b1da74f0
SHA1de2253d0c3e02ea9d27ae6f46082cec9d0164a02
SHA25605f0ac30ce02bc3608d957b40896240ae750da01393f4e26a8951fc7987959ca
SHA512f610ae81854bc99086f139833b7d16b7e7634f53ef1125dc97d01611ec46c262e1f87dde31aa47a19e17a81334c4f25b4096d8e255460e3446bf45d656f5f81c
-
Filesize
1KB
MD57e6d4218f4d91de72684dfcbf95d308c
SHA1d159e72cca5a9b128ce4a4fb3420111222cf3e70
SHA2563710b77ce021b8add8c01948a90c93654d7d46ff93785a64d2acaf4beaf6e089
SHA51205192bbd6af7f2360ebac042beddba308c78804078838eeade1f0a544b73357e4cad32170d032954fd23ed2131599d672730208a9db360c8461f8791c1081d1f