Analysis

  • max time kernel
    128s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    18-01-2024 01:21

General

  • Target

    641be17bc535de14c143b803d9da4d1b.exe

  • Size

    2.3MB

  • MD5

    641be17bc535de14c143b803d9da4d1b

  • SHA1

    42f20588bebcda54ee7482a01c4c12876d1d11a2

  • SHA256

    481040d8ec2c9253e10b7d7bd1712ea29db40c98aae1b58ee21a6f5fcc64854d

  • SHA512

    eea941e06e604db321faa5f4cc1c9d6c036b1eb915c517210434bb688a46517db792ff07ca215403a482550b317bd693779ee96f5b588ca02a5ab56d932674a1

  • SSDEEP

    12288:Pr2WbxQJ6iVmp153F8bQRs2Wb4xRH3xImOj9a4ENpjPsh10LYoE5UcyZmexxlcUa:PrVbxi66I1F8bQDDW9/Esh10LYo/0

Score
10/10

Malware Config

Extracted

Family

blustealer

Credentials

  • Protocol:
    smtp
  • Host:
    bojtai.club
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    hcx8knJINooP

Signatures

  • BluStealer

    A Modular information stealer written in Visual Basic.

  • Uses the VBS compiler for execution 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\641be17bc535de14c143b803d9da4d1b.exe
    "C:\Users\Admin\AppData\Local\Temp\641be17bc535de14c143b803d9da4d1b.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2912
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c
      2⤵
        PID:2836
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
        2⤵
        • Suspicious use of SetWindowsHookEx
        PID:1768

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1768-5-0x0000000000400000-0x0000000000476000-memory.dmp

      Filesize

      472KB

    • memory/1768-7-0x0000000000400000-0x0000000000476000-memory.dmp

      Filesize

      472KB

    • memory/1768-9-0x0000000000400000-0x0000000000476000-memory.dmp

      Filesize

      472KB

    • memory/1768-13-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

      Filesize

      4KB

    • memory/1768-14-0x0000000000400000-0x0000000000476000-memory.dmp

      Filesize

      472KB

    • memory/1768-16-0x0000000000400000-0x0000000000476000-memory.dmp

      Filesize

      472KB

    • memory/1768-19-0x0000000000400000-0x0000000000476000-memory.dmp

      Filesize

      472KB

    • memory/2912-0-0x0000000000230000-0x0000000000478000-memory.dmp

      Filesize

      2.3MB

    • memory/2912-1-0x0000000074960000-0x000000007504E000-memory.dmp

      Filesize

      6.9MB

    • memory/2912-2-0x0000000004F80000-0x0000000004FC0000-memory.dmp

      Filesize

      256KB

    • memory/2912-3-0x0000000074960000-0x000000007504E000-memory.dmp

      Filesize

      6.9MB

    • memory/2912-4-0x0000000004F80000-0x0000000004FC0000-memory.dmp

      Filesize

      256KB