Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
19-03-2024 09:55
Static task
static1
Behavioral task
behavioral1
Sample
d5d26738ed73d191556fc5640b43ed39.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
d5d26738ed73d191556fc5640b43ed39.exe
Resource
win10v2004-20240226-en
General
-
Target
d5d26738ed73d191556fc5640b43ed39.exe
-
Size
743KB
-
MD5
d5d26738ed73d191556fc5640b43ed39
-
SHA1
eaec7a86cbe18f9eb5099ca390e43562701f6d29
-
SHA256
d254826085eaada20b9ab3803fdf88d2326ffcb2e90b36d3fbb129fce1cfed5a
-
SHA512
475c358c8353daac6efe9212bc649ce22197d38f32e6d63543896f77d420ca50717468e32b92dd975d685ef193624ee96bcac958da6265658748ed483f454529
-
SSDEEP
12288:I1Wl8T5+M63xjmevfUu+2EYhsJZ2uEYpplNw:IA24dx0Yrmps
Malware Config
Extracted
blustealer
Protocol: smtp- Host:
mail.sabaint.me - Port:
587 - Username:
[email protected] - Password:
regina1983-
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Executes dropped EXE 1 IoCs
pid Process 2460 PASSWORDSNET4.exe -
Loads dropped DLL 1 IoCs
pid Process 1840 d5d26738ed73d191556fc5640b43ed39.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PASSWORDSNET4.exe Key opened \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PASSWORDSNET4.exe Key opened \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PASSWORDSNET4.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1728 set thread context of 1840 1728 d5d26738ed73d191556fc5640b43ed39.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 PASSWORDSNET4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier PASSWORDSNET4.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1840 d5d26738ed73d191556fc5640b43ed39.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1728 d5d26738ed73d191556fc5640b43ed39.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1840 d5d26738ed73d191556fc5640b43ed39.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1840 d5d26738ed73d191556fc5640b43ed39.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1728 wrote to memory of 1840 1728 d5d26738ed73d191556fc5640b43ed39.exe 28 PID 1728 wrote to memory of 1840 1728 d5d26738ed73d191556fc5640b43ed39.exe 28 PID 1728 wrote to memory of 1840 1728 d5d26738ed73d191556fc5640b43ed39.exe 28 PID 1728 wrote to memory of 1840 1728 d5d26738ed73d191556fc5640b43ed39.exe 28 PID 1728 wrote to memory of 1840 1728 d5d26738ed73d191556fc5640b43ed39.exe 28 PID 1840 wrote to memory of 2460 1840 d5d26738ed73d191556fc5640b43ed39.exe 29 PID 1840 wrote to memory of 2460 1840 d5d26738ed73d191556fc5640b43ed39.exe 29 PID 1840 wrote to memory of 2460 1840 d5d26738ed73d191556fc5640b43ed39.exe 29 PID 1840 wrote to memory of 2460 1840 d5d26738ed73d191556fc5640b43ed39.exe 29 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PASSWORDSNET4.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PASSWORDSNET4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5d26738ed73d191556fc5640b43ed39.exe"C:\Users\Admin\AppData\Local\Temp\d5d26738ed73d191556fc5640b43ed39.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\d5d26738ed73d191556fc5640b43ed39.exe"C:\Users\Admin\AppData\Local\Temp\d5d26738ed73d191556fc5640b43ed39.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\NET4\PASSWORDSNET4.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\NET4\PASSWORDSNET4.exe3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- outlook_office_path
- outlook_win_path
PID:2460
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
122KB
MD537ac88bc53abcc353b3a93f68fb30871
SHA1f5165c03b5de33db3704d502227bac35eae1c6c5
SHA2567bc03158a3c0bcb001093d9d40eaf6b9a7adf14e685db68fbd9d0f135d447ebe
SHA51201c65cbf90c2db90d0563d4a45650d4abd19e1a90bb8467f0e5a57ff1c6c377e3be8216f3324b81af58822b75a22b52f7317df985c11f3a7a45b72843134fc38
-
Filesize
24B
MD598a833e15d18697e8e56cdafb0642647
SHA1e5f94d969899646a3d4635f28a7cd9dd69705887
SHA256ff006c86b5ec033fe3cafd759bf75be00e50c375c75157e99c0c5d39c96a2a6c
SHA512c6f9a09d9707b770dbc10d47c4d9b949f4ebf5f030b5ef8c511b635c32d418ad25d72eee5d7ed02a96aeb8bf2c85491ca1aa0e4336d242793c886ed1bcdd910b
-
Filesize
400B
MD5f1d8dc85a23de44207743192378a2331
SHA13d3e6eb0660a3442b50da3c6f3416f9ef6e9ca42
SHA2561138617261b63e219e734405aa5efba3ce6faeedd506ba7340608209e23e3c7e
SHA5129a9e0c9a0d867c98bdd6009fed45a3d2be872aa81739c28646c1ed94ec5d808440eaede0282a0a2cd3dc4f7fc64c008259f13fd3379179fa819ba2e6ebe96c7b
-
Filesize
156KB
MD50c3c728a9b4376e014bc97f7b1da74f0
SHA1de2253d0c3e02ea9d27ae6f46082cec9d0164a02
SHA25605f0ac30ce02bc3608d957b40896240ae750da01393f4e26a8951fc7987959ca
SHA512f610ae81854bc99086f139833b7d16b7e7634f53ef1125dc97d01611ec46c262e1f87dde31aa47a19e17a81334c4f25b4096d8e255460e3446bf45d656f5f81c
-
Filesize
311B
MD5d41c230e2b5b753d4144484ba09790eb
SHA1e311b9828bd6ce48fd03b67cd28436f940d966cc
SHA256105f1fd44943b8ca5b7b93ac5e0b8d8473241c5906e51b5beee2630e4809bf83
SHA512529bcad8673058a297cd6809dab16193b2b8bb73037e05008acc396738135cdf0932284b50cc9c74767e6fa3191a6569f3e512fc202c55191e7aab436d73e61e