Analysis
-
max time kernel
140s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
16-01-2024 20:42
Static task
static1
Behavioral task
behavioral1
Sample
60d4e7791158258a1c7a50570021acb3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
60d4e7791158258a1c7a50570021acb3.exe
Resource
win10v2004-20231215-en
General
-
Target
60d4e7791158258a1c7a50570021acb3.exe
-
Size
1.2MB
-
MD5
60d4e7791158258a1c7a50570021acb3
-
SHA1
107cbdad79622f6112f4d5eaa2319ea85fa97a9f
-
SHA256
5376e7e271739ec94123ba33b4061ace8309950174746e962c8bade29b571984
-
SHA512
6f8f6ad7ea17b8b4af31c013ee14272b2cdd6babf5c7775adbeccd9c9fb047a55ab75d8a46d69efc7826909d367ed9558aacf9195e2cf29a3eccbb71101902ce
-
SSDEEP
24576:HtImRbYyYAu/5LqBsskWKKIfga1HF/KPLGg3SknffSLexizH6ZQKxO5fLXBVmby+:9Jpv2qB/ku0T/Kyg3SEfjIzgQP9LXBYZ
Malware Config
Extracted
blustealer
Protocol: smtp- Host:
smtp.privateemail.com - Port:
587 - Username:
[email protected] - Password:
@@@@@@
Signatures
-
A310logger
A310 Logger is a .NET stealer/logger targeting passwords from browsers and email clients.
-
BluStealer
A Modular information stealer written in Visual Basic.
-
A310logger Executable 1 IoCs
resource yara_rule behavioral2/memory/3204-8-0x0000000000400000-0x00000000004EE000-memory.dmp a310logger -
Executes dropped EXE 1 IoCs
pid Process 840 TbGWLqTf.exe -
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2308 set thread context of 2452 2308 60d4e7791158258a1c7a50570021acb3.exe 89 PID 2452 set thread context of 3204 2452 60d4e7791158258a1c7a50570021acb3.exe 90 PID 2452 set thread context of 2664 2452 60d4e7791158258a1c7a50570021acb3.exe 91 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2452 60d4e7791158258a1c7a50570021acb3.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2308 60d4e7791158258a1c7a50570021acb3.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2452 60d4e7791158258a1c7a50570021acb3.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2452 60d4e7791158258a1c7a50570021acb3.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2308 wrote to memory of 2452 2308 60d4e7791158258a1c7a50570021acb3.exe 89 PID 2308 wrote to memory of 2452 2308 60d4e7791158258a1c7a50570021acb3.exe 89 PID 2308 wrote to memory of 2452 2308 60d4e7791158258a1c7a50570021acb3.exe 89 PID 2308 wrote to memory of 2452 2308 60d4e7791158258a1c7a50570021acb3.exe 89 PID 2452 wrote to memory of 3204 2452 60d4e7791158258a1c7a50570021acb3.exe 90 PID 2452 wrote to memory of 3204 2452 60d4e7791158258a1c7a50570021acb3.exe 90 PID 2452 wrote to memory of 3204 2452 60d4e7791158258a1c7a50570021acb3.exe 90 PID 2452 wrote to memory of 3204 2452 60d4e7791158258a1c7a50570021acb3.exe 90 PID 2452 wrote to memory of 3204 2452 60d4e7791158258a1c7a50570021acb3.exe 90 PID 2452 wrote to memory of 3204 2452 60d4e7791158258a1c7a50570021acb3.exe 90 PID 2452 wrote to memory of 3204 2452 60d4e7791158258a1c7a50570021acb3.exe 90 PID 2452 wrote to memory of 3204 2452 60d4e7791158258a1c7a50570021acb3.exe 90 PID 2452 wrote to memory of 2664 2452 60d4e7791158258a1c7a50570021acb3.exe 91 PID 2452 wrote to memory of 2664 2452 60d4e7791158258a1c7a50570021acb3.exe 91 PID 2452 wrote to memory of 2664 2452 60d4e7791158258a1c7a50570021acb3.exe 91 PID 2452 wrote to memory of 2664 2452 60d4e7791158258a1c7a50570021acb3.exe 91 PID 2452 wrote to memory of 2664 2452 60d4e7791158258a1c7a50570021acb3.exe 91 PID 2452 wrote to memory of 2664 2452 60d4e7791158258a1c7a50570021acb3.exe 91 PID 2452 wrote to memory of 2664 2452 60d4e7791158258a1c7a50570021acb3.exe 91 PID 2452 wrote to memory of 2664 2452 60d4e7791158258a1c7a50570021acb3.exe 91 PID 2664 wrote to memory of 840 2664 AppLaunch.exe 92 PID 2664 wrote to memory of 840 2664 AppLaunch.exe 92 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\60d4e7791158258a1c7a50570021acb3.exe"C:\Users\Admin\AppData\Local\Temp\60d4e7791158258a1c7a50570021acb3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\60d4e7791158258a1c7a50570021acb3.exe"C:\Users\Admin\AppData\Local\Temp\60d4e7791158258a1c7a50570021acb3.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:3204
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\TbGWLqTf.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\TbGWLqTf.exe"4⤵
- Executes dropped EXE
PID:840
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
323B
MD54af72c00db90b95c23cc32823c5b0453
SHA180f3754f05c09278987cba54e34b76f1ddbee5fd
SHA2565a99dc099cb5297a4d7714af94b14f170d8a0506899c82d6b8231a220f8dba5d
SHA51247aa798c4822bfd0b2a9110fcd1531494da99cf6e4aba5b59bfc36e21fcb1bdb5378189318bbb8519f0e8be732d90637f787ab63997d106bbcff31396155f9ef
-
Filesize
24B
MD598a833e15d18697e8e56cdafb0642647
SHA1e5f94d969899646a3d4635f28a7cd9dd69705887
SHA256ff006c86b5ec033fe3cafd759bf75be00e50c375c75157e99c0c5d39c96a2a6c
SHA512c6f9a09d9707b770dbc10d47c4d9b949f4ebf5f030b5ef8c511b635c32d418ad25d72eee5d7ed02a96aeb8bf2c85491ca1aa0e4336d242793c886ed1bcdd910b
-
Filesize
4.3MB
MD5f3ffd41efc37d99d39c09cba114f23d9
SHA10a280bd83dd22ff70b3347870fa79be404168435
SHA2566157013937a146a0ed14b187b88676ca94e76d9339d23c7ccd38dfe658d44dff
SHA51219dbafbff2cf2dd62bfd52e7e7b2c94778537235c42bfe891493ff71857b8b35bad499c1dfea3ebc88584cb763ee26b84ba7b0e90e38cd47d7a02a35b8338d71
-
Filesize
318KB
MD53439a28236fdedf004f7ba884986a2b9
SHA150730ff19ae630481f6e293b8418b7d9092b6416
SHA25672a68740918e8262e3b8cec9a3078de7a8f75b44324339db290089cc1ea5d3a6
SHA512eca2cfaac05a356a04980bbfa9153fab898bb361b8fac3f2c71637d3f64b474a969ed4da354fb1b2380036151177d4eab62981b759223d2f2884934ee586e533
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
Filesize
215KB
MD512ff699e8db5891226785a819be5ad1d
SHA1b452ab51ccea551bc229e02b7151435eeec84e07
SHA2562707d0baddc9e1f75925e82570423fab8fa6e0f55079c37c85b78585eb041a9e
SHA512077ff1bff334ed43aa66a890b2da7793c45c82eeb2ba22579fd09b0bdcc53f01f2566a858228c6ee368188c5e4d174baccc9b3480a5164deaf807da32c04f6b1
-
Filesize
338KB
MD5eb24b23e9f35e731453144e7b9f5d152
SHA10ab942299b172507d9e90a6171f2a69817a09208
SHA256e8cd77da5b4c00ed86a63005e4c5121f43a307f99bc85eacd7d341a07c36621f
SHA512ada6b8e33775ff972292aafdc112da516f4050382a8a17dc65bf641fbe2625bb046689a0777d6b99f07fe0491bd344cba3497fb11be73cf261a1f000fff16b36
-
Filesize
359KB
MD5a7a78506764e748743ceba0fc952dbdd
SHA1201a07eba45dbe392f3a84cc6d726139a13a57cc
SHA256f9c13f55625e01fb8fb45e24e1f192500205ebc90370b91206f3352aee6efe84
SHA5122fe5ca79b49fdc0d01ea08bff1fe1378d8b1943e7737ea2d5781ba4fa2a3cb5ff5396cd8613ba47530b225d9b8da506f168e0622386930683a91272865950ed8
-
Filesize
349KB
MD574fd19ca15004ceb019fd7a60373a668
SHA170db63645c615e593007136e6c79936b3fe31380
SHA256bf915a1d52684201531d2e1d4ba3b1bc2ed8180ed686dc1de1a48fe9710fb716
SHA512c526b06de2c3f6f9208ad65a608dfa6b777e228e823833a5c19dcea7c0450ddd28419ac60e0097b83b8dc14db8cd110d3d606e11f42779fe7fcff7aa5a4695c6
-
Filesize
503KB
MD52d5f51c8f6f04f774980abd8a015598b
SHA1cce15736dc69e58dc8cb9bb294033622b5bdf50c
SHA256c00397a932f75d8fc23d66fd47617a439070439ae86f66dde1915845fcfd0201
SHA51230a31795db68c206320c77f0bd0ffd78e5bc5d61e0222a8db30487476827149ddc1c8f008035f901b19df8b23772f58deb33aedd5c39f7f704bc83d94765ce4a
-
Filesize
369KB
MD5473cab9963a082b22ee17866dc5dce9e
SHA1be6046c2e277706a66a5d73b922baad134f74c08
SHA256f6129c60dc187fafa4bcd0b72b964e2f5f35db8c8054dd1033159a168789f06c
SHA512f27afacdd71620a29c43f5782de075b4c787ca84f5028866282e879da2764ad56ab40a97c30c21b6ec23b0f9b8c89203881ceff9bff8a654439cd32f6f497a3e
-
Filesize
523KB
MD57ee26575da148b8d0d783a4b6d4aa61d
SHA13131defbbf38de7b48f8836a75862434ea674a4a
SHA256bf588fb9a4fd54fb595083d47f2950362b3ef3b40650101f299c68f6ccb50e8f
SHA512f71053bd9430bdd0d9e18b77b8a4a517da23977037dd3ef486c7aca9bb1ffd24421eb72808dd4ac5f6bb108100732e90b4865f4a7ac183ee1350ddbdd44fd751
-
Filesize
11KB
MD54a8fbd593a733fc669169d614021185b
SHA1166e66575715d4c52bcb471c09bdbc5a9bb2f615
SHA256714cd32f8edacb3befbfc4b17db5b6eb05c2c8936e3bae14ea25a6050d88ae42
SHA5126b2ebbbc34cd821fd9b3d7711d9cdadd8736412227e191883e5df19068f8118b7c80248eb61cc0a2f785a4153871a6003d79de934254b2c74c33b284c507a33b
-
Filesize
729KB
MD51fdda2aaefdc95da0eb47ec35ff052b4
SHA18d74a0468cfccb344a0000b5b702ea2af24a0f49
SHA256e1d1c4a5edb80f71e721419f2b1ea289b4b3bdcc15737803c347ccb722e8b73e
SHA512fae2ab206308bc77e2ab8215929bdc6cbf43e7351d3816e1c81804495fecb799c8e161cc257f15de092857272fc2792a5431db8943b5d853e62a4599426b50e2
-
Filesize
11KB
MD5bfbc1a403197ac8cfc95638c2da2cf0e
SHA1634658f4dd9747e87fa540f5ba47e218acfc8af2
SHA256272ed278e82c84cf4f80f48ec7989e1fc35f2055d6d05b63c8a31880846597a6
SHA512b8938526fcbf7152805aec130ca553e3ec949cb825430a5d0a25c90ec5eb0863857010484a4b31fdc4bb65a4c92ad7127c812b93114be4569a677f60debe43b1
-
Filesize
11KB
MD53b068f508d40eb8258ff0b0592ca1f9c
SHA159ac025c3256e9c6c86165082974fe791ff9833a
SHA25607db44a8d6c3a512b15f1cb7262a2d7e4b63ced2130bc9228515431699191cc7
SHA512e29624bc8fecb0e2a9d917642375bd97b42502e5f23812195a61a4920cae5b6ed540e74dfcf8432dcceb7de906ad0501cdd68056f9b0ec86a6bb0c1e336bfe32
-
Filesize
225KB
MD5fc9a20f53e1a62b1244fdfc454c2f659
SHA169164b9a27a2dc3d471b218d2699c33156ca835e
SHA256155edb062b83cc6a008b52158c6a6ae543fcf46ec6667c538a2678797bd47c81
SHA512c3c4916c3fa9f9fe5da72809c0d03415e80a74d88bf9dc7527d5220fc4ebfe3a5826e542a485a000b686f5bcd24602345834d96bfc7cafa72d075575c5db114f
-
Filesize
11KB
MD587cbab2a743fb7e0625cc332c9aac537
SHA150f858caa7f4ac3a93cf141a5d15b4edeb447ee7
SHA25657e3b0d22fa619da90237d8bcf8f922b142c9f6abf47efc5a1f5b208c4d3f023
SHA5126b678f0dd0030806effe6825fd52a6a30b951e0c3dcf91dfd7a713d387aa8b39ec24368e9623c463360acba5e929e268f75ce996526c5d4485894b8ac6b2e0fa
-
Filesize
472KB
MD5172aa5de5b3757ffe287eed438d9672b
SHA112991e469a645025fee8e880f3e408901c6aa172
SHA2568d78d8c07d6e8bf5e7dc78155123842fa7e747dd25ffaae93b82a0ed28cd2837
SHA51268014f8ab3f6b6fece19c8bbde3621ed816cb0e7e66585631e1d58bdac7586b15dc863a1876dcaba8297998dccf29aaaf199566465b30adfa8d26cce4628ce4c
-
Filesize
14KB
MD5cee9e5557497f2841f7d8d03f05f1ac2
SHA13f71cb00bddf88b0484be7088b4377c49ff58e3f
SHA256ac957ccfa1e57a1da76837c90723ce5c71951e944cbb24a4bf47e331b41942ec
SHA512f9730d2236e6d53a9dbda3ad9c0dc3c54613da4aa6e152608ef436c01c69f64f740ed869b4e63b5cf2486fd35cda088fb234d1ee17fdb908d035047e45f9cbea
-
Filesize
691B
MD5055c857272026583a61e1b5821c69a24
SHA1ec39d34f16487682801dd2b319554cbed57feca4
SHA256190db16bb64995e3bdea04b9e6fc1994dacfea3253a7559732205b1d41362b84
SHA512d7833c4651683e95959107e05b07b60d2e963b9fbecd0106b329e2087d1dfc9aedb962b334e22b6b462699cbce86097d4d50ce5d1310ad098e3531efaa4e204b