Analysis
-
max time kernel
128s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
18-01-2024 01:21
Static task
static1
Behavioral task
behavioral1
Sample
641be17bc535de14c143b803d9da4d1b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
641be17bc535de14c143b803d9da4d1b.exe
Resource
win10v2004-20231215-en
General
-
Target
641be17bc535de14c143b803d9da4d1b.exe
-
Size
2.3MB
-
MD5
641be17bc535de14c143b803d9da4d1b
-
SHA1
42f20588bebcda54ee7482a01c4c12876d1d11a2
-
SHA256
481040d8ec2c9253e10b7d7bd1712ea29db40c98aae1b58ee21a6f5fcc64854d
-
SHA512
eea941e06e604db321faa5f4cc1c9d6c036b1eb915c517210434bb688a46517db792ff07ca215403a482550b317bd693779ee96f5b588ca02a5ab56d932674a1
-
SSDEEP
12288:Pr2WbxQJ6iVmp153F8bQRs2Wb4xRH3xImOj9a4ENpjPsh10LYoE5UcyZmexxlcUa:PrVbxi66I1F8bQDDW9/Esh10LYo/0
Malware Config
Extracted
blustealer
Protocol: smtp- Host:
bojtai.club - Port:
587 - Username:
[email protected] - Password:
hcx8knJINooP
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2912 set thread context of 1768 2912 641be17bc535de14c143b803d9da4d1b.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2912 641be17bc535de14c143b803d9da4d1b.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1768 vbc.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2912 wrote to memory of 2836 2912 641be17bc535de14c143b803d9da4d1b.exe 30 PID 2912 wrote to memory of 2836 2912 641be17bc535de14c143b803d9da4d1b.exe 30 PID 2912 wrote to memory of 2836 2912 641be17bc535de14c143b803d9da4d1b.exe 30 PID 2912 wrote to memory of 2836 2912 641be17bc535de14c143b803d9da4d1b.exe 30 PID 2912 wrote to memory of 1768 2912 641be17bc535de14c143b803d9da4d1b.exe 32 PID 2912 wrote to memory of 1768 2912 641be17bc535de14c143b803d9da4d1b.exe 32 PID 2912 wrote to memory of 1768 2912 641be17bc535de14c143b803d9da4d1b.exe 32 PID 2912 wrote to memory of 1768 2912 641be17bc535de14c143b803d9da4d1b.exe 32 PID 2912 wrote to memory of 1768 2912 641be17bc535de14c143b803d9da4d1b.exe 32 PID 2912 wrote to memory of 1768 2912 641be17bc535de14c143b803d9da4d1b.exe 32 PID 2912 wrote to memory of 1768 2912 641be17bc535de14c143b803d9da4d1b.exe 32 PID 2912 wrote to memory of 1768 2912 641be17bc535de14c143b803d9da4d1b.exe 32 PID 2912 wrote to memory of 1768 2912 641be17bc535de14c143b803d9da4d1b.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\641be17bc535de14c143b803d9da4d1b.exe"C:\Users\Admin\AppData\Local\Temp\641be17bc535de14c143b803d9da4d1b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c2⤵PID:2836
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:1768
-