Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-01-2024 13:22

General

  • Target

    74ccfbabd5376167c9e52c89c0478ec5.exe

  • Size

    1016KB

  • MD5

    74ccfbabd5376167c9e52c89c0478ec5

  • SHA1

    f054d3de07ec041a53e6566ad654fbd6f2a04098

  • SHA256

    24631515535420a7600ac6e1191f49b8162c7c3d1ca82a163b66451e448fab2f

  • SHA512

    dbf6a2395f3c56f074c750723a9b5568f035ab409fb502d0d068f2efc8d558978d00c282c51d6fbc64b1985071dde6ee26240e58b6e12dd0c2ff127de4b29f87

  • SSDEEP

    24576:Zg0sM873s6inVKDdbHUCB80yET0QMTS+YLY3qwhs:ZV9ms6cY9uoaVAs4

Malware Config

Extracted

Family

blustealer

Credentials

  • Protocol:
    smtp
  • Host:
    mail.enche.com
  • Port:
    587
  • Username:
    merchandise@enche.com
  • Password:
    Merchandise08012021

Signatures

  • A310logger

    A310 Logger is a .NET stealer/logger targeting passwords from browsers and email clients.

  • BluStealer

    A Modular information stealer written in Visual Basic.

  • A310logger Executable 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\74ccfbabd5376167c9e52c89c0478ec5.exe
    "C:\Users\Admin\AppData\Local\Temp\74ccfbabd5376167c9e52c89c0478ec5.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3436
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\74ccfbabd5376167c9e52c89c0478ec5.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3180
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\zFdYmdUOJ.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1836
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zFdYmdUOJ" /XML "C:\Users\Admin\AppData\Local\Temp\tmpCA50.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:1588
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\zFdYmdUOJ.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5036
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
      2⤵
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4864
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\NET4\Fox.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\NET4\Fox.exe
        3⤵
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • outlook_office_path
        • outlook_win_path
        PID:1696

Network

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Credential Access

Unsecured Credentials

3
T1552

Credentials In Files

3
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
    Filesize

    2KB

    MD5

    968cb9309758126772781b83adb8a28f

    SHA1

    8da30e71accf186b2ba11da1797cf67f8f78b47c

    SHA256

    92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

    SHA512

    4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    18KB

    MD5

    2097c79a1175c7461867ca3dbd134b09

    SHA1

    9a9ec385626bf19fa1cc69852c2a654cedc104ce

    SHA256

    6b5dcc248dffe3b178715378e30941771e589014e9be523aae215788614c22eb

    SHA512

    bf9a98aa936314072742737e07d0405840992166f3b394c43e5ef3a4938285dca1c199b02e1614ee795304bb5f216e6c114dd04c4febbbe5b5c32ab018b09748

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_2l1v4jxd.iag.ps1
    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\tmpCA50.tmp
    Filesize

    1KB

    MD5

    5010f8ff53a537667801b0033d3862c0

    SHA1

    fd4341faa36c7b565b81fd493496875181526f2c

    SHA256

    b4bd52f17b692406e175d1ed58bcd156758bf83c8a4584b07d5d976217ad7373

    SHA512

    328f138b6ecbda9ab0f28b70cf9cf857236dbdb10e2cd12a6d3b90f227d26f28c0031f393878975ee531fe171c604b21e11e4cf102b4f10509304b5972d9c391

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\NET4\Fox.exe
    Filesize

    689KB

    MD5

    91b41651e6e9ab352805c6d35a297d08

    SHA1

    11b8eaa7b7941461bc952b11ec3f07d25dcd1c2e

    SHA256

    0872abe29cc9231cdded3a44e02a7ea17f09cf2ac2bdbd7077065858829c3723

    SHA512

    b0b0d73f6ac7b6e9b39db0fa58931873143f6559c3b8d3db2d82d453045f75da94f3236b6c6c5200b52af6cacc038565eb2e9c6a834608dac0b0e8bb45b1e892

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\VR2OYSDUNH.zip
    Filesize

    285KB

    MD5

    40a9752d59f2883e40d928f85a749008

    SHA1

    c60fb58eff64a7969b46f3934766f991352eeb47

    SHA256

    ef95540ec8dae3d255439fb847d26397c265b5cccda5ed0d6b9ed3dda14a2820

    SHA512

    ce33985f91103315accb1039635488d7e144df264bab8e164c1f9844ce6923e1c9c76349f14542901887ffcbbbca40b92cf474126f0b94893e8af1f608464b3c

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\credentials.txt
    Filesize

    691B

    MD5

    607a140b41b072e78993d3fa66815c2f

    SHA1

    b9bb63486b524a903100f5e835646ae78c152a0e

    SHA256

    2c6357f759dedbfc6408812338375ec93612881d36739e5d55b5aac458f9492e

    SHA512

    023685880e1b933a29c4f95772b4f377f88ae76985394bc8b81cc5f2e6429a9dd6672d4503f424a67ef5057fcf027d97e50f87faa8ac692e4c99004bf610f0b6

  • memory/1696-107-0x00007FF9767D0000-0x00007FF977291000-memory.dmp
    Filesize

    10.8MB

  • memory/1696-99-0x000000001BD50000-0x000000001BD60000-memory.dmp
    Filesize

    64KB

  • memory/1696-98-0x00007FF9767D0000-0x00007FF977291000-memory.dmp
    Filesize

    10.8MB

  • memory/1696-97-0x0000000000FA0000-0x0000000001052000-memory.dmp
    Filesize

    712KB

  • memory/1836-22-0x0000000074A90000-0x0000000075240000-memory.dmp
    Filesize

    7.7MB

  • memory/1836-150-0x0000000074A90000-0x0000000075240000-memory.dmp
    Filesize

    7.7MB

  • memory/1836-130-0x0000000070DB0000-0x0000000070DFC000-memory.dmp
    Filesize

    304KB

  • memory/1836-149-0x0000000007580000-0x0000000007623000-memory.dmp
    Filesize

    652KB

  • memory/1836-151-0x000000007F6C0000-0x000000007F6D0000-memory.dmp
    Filesize

    64KB

  • memory/1836-90-0x0000000006620000-0x000000000666C000-memory.dmp
    Filesize

    304KB

  • memory/1836-152-0x0000000007ED0000-0x000000000854A000-memory.dmp
    Filesize

    6.5MB

  • memory/1836-171-0x0000000074A90000-0x0000000075240000-memory.dmp
    Filesize

    7.7MB

  • memory/1836-155-0x0000000002C40000-0x0000000002C50000-memory.dmp
    Filesize

    64KB

  • memory/1836-24-0x0000000002C40000-0x0000000002C50000-memory.dmp
    Filesize

    64KB

  • memory/1836-27-0x0000000005F20000-0x0000000005F86000-memory.dmp
    Filesize

    408KB

  • memory/1836-42-0x0000000005F90000-0x00000000062E4000-memory.dmp
    Filesize

    3.3MB

  • memory/1836-163-0x0000000007BD0000-0x0000000007BD8000-memory.dmp
    Filesize

    32KB

  • memory/1836-25-0x0000000005510000-0x0000000005532000-memory.dmp
    Filesize

    136KB

  • memory/1836-161-0x0000000007BF0000-0x0000000007C0A000-memory.dmp
    Filesize

    104KB

  • memory/3180-20-0x0000000005190000-0x00000000051A0000-memory.dmp
    Filesize

    64KB

  • memory/3180-118-0x0000000005190000-0x00000000051A0000-memory.dmp
    Filesize

    64KB

  • memory/3180-159-0x0000000007C50000-0x0000000007C64000-memory.dmp
    Filesize

    80KB

  • memory/3180-157-0x0000000007C20000-0x0000000007C31000-memory.dmp
    Filesize

    68KB

  • memory/3180-156-0x0000000007C80000-0x0000000007D16000-memory.dmp
    Filesize

    600KB

  • memory/3180-170-0x0000000074A90000-0x0000000075240000-memory.dmp
    Filesize

    7.7MB

  • memory/3180-21-0x00000000057D0000-0x0000000005DF8000-memory.dmp
    Filesize

    6.2MB

  • memory/3180-75-0x00000000066F0000-0x000000000670E000-memory.dmp
    Filesize

    120KB

  • memory/3180-158-0x0000000007C40000-0x0000000007C4E000-memory.dmp
    Filesize

    56KB

  • memory/3180-26-0x0000000005ED0000-0x0000000005F36000-memory.dmp
    Filesize

    408KB

  • memory/3180-18-0x0000000074A90000-0x0000000075240000-memory.dmp
    Filesize

    7.7MB

  • memory/3180-114-0x000000007F510000-0x000000007F520000-memory.dmp
    Filesize

    64KB

  • memory/3180-17-0x00000000050F0000-0x0000000005126000-memory.dmp
    Filesize

    216KB

  • memory/3180-116-0x00000000076C0000-0x00000000076F2000-memory.dmp
    Filesize

    200KB

  • memory/3180-108-0x0000000074A90000-0x0000000075240000-memory.dmp
    Filesize

    7.7MB

  • memory/3180-110-0x0000000005190000-0x00000000051A0000-memory.dmp
    Filesize

    64KB

  • memory/3180-119-0x0000000070DB0000-0x0000000070DFC000-memory.dmp
    Filesize

    304KB

  • memory/3180-111-0x0000000005190000-0x00000000051A0000-memory.dmp
    Filesize

    64KB

  • memory/3180-19-0x0000000005190000-0x00000000051A0000-memory.dmp
    Filesize

    64KB

  • memory/3436-51-0x0000000074A90000-0x0000000075240000-memory.dmp
    Filesize

    7.7MB

  • memory/3436-7-0x0000000005390000-0x00000000053E6000-memory.dmp
    Filesize

    344KB

  • memory/3436-3-0x0000000005800000-0x0000000005DA4000-memory.dmp
    Filesize

    5.6MB

  • memory/3436-11-0x0000000006CA0000-0x0000000006D74000-memory.dmp
    Filesize

    848KB

  • memory/3436-0-0x0000000074A90000-0x0000000075240000-memory.dmp
    Filesize

    7.7MB

  • memory/3436-4-0x00000000052F0000-0x0000000005382000-memory.dmp
    Filesize

    584KB

  • memory/3436-5-0x00000000054A0000-0x00000000054B0000-memory.dmp
    Filesize

    64KB

  • memory/3436-1-0x00000000006B0000-0x00000000007B4000-memory.dmp
    Filesize

    1.0MB

  • memory/3436-6-0x0000000005250000-0x000000000525A000-memory.dmp
    Filesize

    40KB

  • memory/3436-12-0x00000000069D0000-0x0000000006A38000-memory.dmp
    Filesize

    416KB

  • memory/3436-8-0x0000000005450000-0x0000000005468000-memory.dmp
    Filesize

    96KB

  • memory/3436-9-0x0000000074A90000-0x0000000075240000-memory.dmp
    Filesize

    7.7MB

  • memory/3436-2-0x00000000051B0000-0x000000000524C000-memory.dmp
    Filesize

    624KB

  • memory/3436-10-0x00000000054A0000-0x00000000054B0000-memory.dmp
    Filesize

    64KB

  • memory/4864-28-0x0000000000400000-0x000000000045B000-memory.dmp
    Filesize

    364KB

  • memory/4864-160-0x0000000000400000-0x000000000045B000-memory.dmp
    Filesize

    364KB

  • memory/4864-41-0x0000000000400000-0x000000000045B000-memory.dmp
    Filesize

    364KB

  • memory/5036-129-0x0000000006C30000-0x0000000006C4E000-memory.dmp
    Filesize

    120KB

  • memory/5036-54-0x0000000074A90000-0x0000000075240000-memory.dmp
    Filesize

    7.7MB

  • memory/5036-56-0x00000000053C0000-0x00000000053D0000-memory.dmp
    Filesize

    64KB

  • memory/5036-57-0x00000000053C0000-0x00000000053D0000-memory.dmp
    Filesize

    64KB

  • memory/5036-162-0x0000000074A90000-0x0000000075240000-memory.dmp
    Filesize

    7.7MB

  • memory/5036-154-0x00000000079E0000-0x00000000079EA000-memory.dmp
    Filesize

    40KB

  • memory/5036-153-0x0000000007970000-0x000000000798A000-memory.dmp
    Filesize

    104KB

  • memory/5036-115-0x000000007F5A0000-0x000000007F5B0000-memory.dmp
    Filesize

    64KB

  • memory/5036-109-0x00000000053C0000-0x00000000053D0000-memory.dmp
    Filesize

    64KB

  • memory/5036-169-0x0000000074A90000-0x0000000075240000-memory.dmp
    Filesize

    7.7MB

  • memory/5036-117-0x0000000070DB0000-0x0000000070DFC000-memory.dmp
    Filesize

    304KB