Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
23-12-2024 23:46
Static task
static1
Behavioral task
behavioral1
Sample
RFQ 10050395.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
RFQ 10050395.exe
Resource
win10v2004-20241007-en
General
-
Target
RFQ 10050395.exe
-
Size
733KB
-
MD5
208b8885063f4562e1e181c63f155bd1
-
SHA1
b0071008c3ae769433c6c71acd49c80a4b5a853d
-
SHA256
a47f1b1a2995865a081e270569e3cb0857d3af3759c2e06b72e3f418e9611a87
-
SHA512
96f48b489308904e883c004514cc0cd33cfeb893f03e4f9d9454b88c95c991cad2b9773040c4a9d08d524d0f79cf7232e4cc81352ea0a0100c4c7dbf99c5e3f7
-
SSDEEP
12288:2oskPRxliW1b0LxY7GM2NPdqysk6iQrWE8Y8Ll1ytjkJhLIsbpGNjFLSlaE3y69U:2oskPRrhbi22hdqyMWEPgylkJhbbpalp
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5330579892:AAHDIOXrD-d-pMU_JI4pPczBI962-9fokRs/sendMessage?chat_id=1494890429
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Blustealer family
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1736 set thread context of 2324 1736 RFQ 10050395.exe 30 PID 2324 set thread context of 3040 2324 RFQ 10050395.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RFQ 10050395.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RFQ 10050395.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2324 RFQ 10050395.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1736 wrote to memory of 2324 1736 RFQ 10050395.exe 30 PID 1736 wrote to memory of 2324 1736 RFQ 10050395.exe 30 PID 1736 wrote to memory of 2324 1736 RFQ 10050395.exe 30 PID 1736 wrote to memory of 2324 1736 RFQ 10050395.exe 30 PID 1736 wrote to memory of 2324 1736 RFQ 10050395.exe 30 PID 1736 wrote to memory of 2324 1736 RFQ 10050395.exe 30 PID 1736 wrote to memory of 2324 1736 RFQ 10050395.exe 30 PID 1736 wrote to memory of 2324 1736 RFQ 10050395.exe 30 PID 1736 wrote to memory of 2324 1736 RFQ 10050395.exe 30 PID 2324 wrote to memory of 3040 2324 RFQ 10050395.exe 31 PID 2324 wrote to memory of 3040 2324 RFQ 10050395.exe 31 PID 2324 wrote to memory of 3040 2324 RFQ 10050395.exe 31 PID 2324 wrote to memory of 3040 2324 RFQ 10050395.exe 31 PID 2324 wrote to memory of 3040 2324 RFQ 10050395.exe 31 PID 2324 wrote to memory of 3040 2324 RFQ 10050395.exe 31 PID 2324 wrote to memory of 3040 2324 RFQ 10050395.exe 31 PID 2324 wrote to memory of 3040 2324 RFQ 10050395.exe 31 PID 2324 wrote to memory of 3040 2324 RFQ 10050395.exe 31 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFQ 10050395.exe"C:\Users\Admin\AppData\Local\Temp\RFQ 10050395.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\RFQ 10050395.exe"C:\Users\Admin\AppData\Local\Temp\RFQ 10050395.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe3⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- outlook_office_path
- outlook_win_path
PID:3040
-
-