Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-12-2024 23:46
Static task
static1
Behavioral task
behavioral1
Sample
RFQ 10050395.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
RFQ 10050395.exe
Resource
win10v2004-20241007-en
General
-
Target
RFQ 10050395.exe
-
Size
733KB
-
MD5
208b8885063f4562e1e181c63f155bd1
-
SHA1
b0071008c3ae769433c6c71acd49c80a4b5a853d
-
SHA256
a47f1b1a2995865a081e270569e3cb0857d3af3759c2e06b72e3f418e9611a87
-
SHA512
96f48b489308904e883c004514cc0cd33cfeb893f03e4f9d9454b88c95c991cad2b9773040c4a9d08d524d0f79cf7232e4cc81352ea0a0100c4c7dbf99c5e3f7
-
SSDEEP
12288:2oskPRxliW1b0LxY7GM2NPdqysk6iQrWE8Y8Ll1ytjkJhLIsbpGNjFLSlaE3y69U:2oskPRrhbi22hdqyMWEPgylkJhbbpalp
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5330579892:AAHDIOXrD-d-pMU_JI4pPczBI962-9fokRs/sendMessage?chat_id=1494890429
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Blustealer family
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4692 set thread context of 436 4692 RFQ 10050395.exe 97 PID 436 set thread context of 4632 436 RFQ 10050395.exe 100 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RFQ 10050395.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RFQ 10050395.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 34 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 436 RFQ 10050395.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4692 wrote to memory of 436 4692 RFQ 10050395.exe 97 PID 4692 wrote to memory of 436 4692 RFQ 10050395.exe 97 PID 4692 wrote to memory of 436 4692 RFQ 10050395.exe 97 PID 4692 wrote to memory of 436 4692 RFQ 10050395.exe 97 PID 4692 wrote to memory of 436 4692 RFQ 10050395.exe 97 PID 4692 wrote to memory of 436 4692 RFQ 10050395.exe 97 PID 4692 wrote to memory of 436 4692 RFQ 10050395.exe 97 PID 4692 wrote to memory of 436 4692 RFQ 10050395.exe 97 PID 436 wrote to memory of 4632 436 RFQ 10050395.exe 100 PID 436 wrote to memory of 4632 436 RFQ 10050395.exe 100 PID 436 wrote to memory of 4632 436 RFQ 10050395.exe 100 PID 436 wrote to memory of 4632 436 RFQ 10050395.exe 100 PID 436 wrote to memory of 4632 436 RFQ 10050395.exe 100 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFQ 10050395.exe"C:\Users\Admin\AppData\Local\Temp\RFQ 10050395.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\RFQ 10050395.exe"C:\Users\Admin\AppData\Local\Temp\RFQ 10050395.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe3⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- outlook_office_path
- outlook_win_path
PID:4632
-
-