Overview
overview
10Static
static
0494e1b88f...90.exe
windows7-x64
30494e1b88f...90.exe
windows10-2004-x64
30f41c175bc...07.exe
windows7-x64
30f41c175bc...07.exe
windows10-2004-x64
30f78cea418...13.exe
windows7-x64
30f78cea418...13.exe
windows10-2004-x64
312ffee3e2c...c5.exe
windows7-x64
312ffee3e2c...c5.exe
windows10-2004-x64
31449f8a93c...3a.exe
windows7-x64
71449f8a93c...3a.exe
windows10-2004-x64
71463bbb2a8...13.exe
windows7-x64
101463bbb2a8...13.exe
windows10-2004-x64
10148b25ad23...fa.exe
windows7-x64
7148b25ad23...fa.exe
windows10-2004-x64
71fe05e5f82...ec.exe
windows7-x64
101fe05e5f82...ec.exe
windows10-2004-x64
102a12cf13b7...8c.exe
windows7-x64
102a12cf13b7...8c.exe
windows10-2004-x64
102aaa916d56...f3.exe
windows7-x64
102aaa916d56...f3.exe
windows10-2004-x64
102b247f89f1...d0.exe
windows7-x64
72b247f89f1...d0.exe
windows10-2004-x64
73757406d4b...a9.exe
windows7-x64
33757406d4b...a9.exe
windows10-2004-x64
339828c100c...f5.exe
windows7-x64
339828c100c...f5.exe
windows10-2004-x64
33ac3fd9de6...e2.exe
windows7-x64
103ac3fd9de6...e2.exe
windows10-2004-x64
104c0d6edc64...3f.exe
windows7-x64
104c0d6edc64...3f.exe
windows10-2004-x64
104fe551bcea...e5.exe
windows7-x64
104fe551bcea...e5.exe
windows10-2004-x64
10Analysis
-
max time kernel
137s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05-09-2022 15:50
Static task
static1
Behavioral task
behavioral1
Sample
0494e1b88f4a3b69162ef51971246f87c0ad434549a802ae7d54aee954190090.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0494e1b88f4a3b69162ef51971246f87c0ad434549a802ae7d54aee954190090.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
0f41c175bc3b7e6c6688b143d5e8d037d5ce6671886fb3a10e5fcbaa6cd1cd07.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
0f41c175bc3b7e6c6688b143d5e8d037d5ce6671886fb3a10e5fcbaa6cd1cd07.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
0f78cea41852b4b219e4127e5db31404d463594d7e893c1498afe0938cf83813.exe
Resource
win7-20220901-en
Behavioral task
behavioral6
Sample
0f78cea41852b4b219e4127e5db31404d463594d7e893c1498afe0938cf83813.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
12ffee3e2c5daf4019991827cefc744154de65568c9527755bd548d0740058c5.exe
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
12ffee3e2c5daf4019991827cefc744154de65568c9527755bd548d0740058c5.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
1449f8a93c3bf1bf34091945ecce2da9e7e71b8cc7235309e37031edc801303a.exe
Resource
win7-20220901-en
Behavioral task
behavioral10
Sample
1449f8a93c3bf1bf34091945ecce2da9e7e71b8cc7235309e37031edc801303a.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
1463bbb2a82fb27ad4b86489b2910a8ec9c1a29cf19aaaa0da37b9217f674513.exe
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
1463bbb2a82fb27ad4b86489b2910a8ec9c1a29cf19aaaa0da37b9217f674513.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
148b25ad23097ace1d616a362c65706e63e392133cdda5495aaa3b70e6064ffa.exe
Resource
win7-20220901-en
Behavioral task
behavioral14
Sample
148b25ad23097ace1d616a362c65706e63e392133cdda5495aaa3b70e6064ffa.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral15
Sample
1fe05e5f8237f2c9c6b079eaf4f1e21aea96b1a092a66bf3ab9633a59c50c6ec.exe
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
1fe05e5f8237f2c9c6b079eaf4f1e21aea96b1a092a66bf3ab9633a59c50c6ec.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral17
Sample
2a12cf13b7145e1ddb3cc6b36b0716ee3563f35ba5544b1c127fb553f0a2108c.exe
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
2a12cf13b7145e1ddb3cc6b36b0716ee3563f35ba5544b1c127fb553f0a2108c.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
2aaa916d56cfe95abb65fbc222bfdfa2b16a3ffb6660c1bdc211004302a1aef3.exe
Resource
win7-20220812-en
Behavioral task
behavioral20
Sample
2aaa916d56cfe95abb65fbc222bfdfa2b16a3ffb6660c1bdc211004302a1aef3.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral21
Sample
2b247f89f132b4674e69a4403e715f7eb951278e77bdb9a9f62605d21b6df2d0.exe
Resource
win7-20220812-en
Behavioral task
behavioral22
Sample
2b247f89f132b4674e69a4403e715f7eb951278e77bdb9a9f62605d21b6df2d0.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral23
Sample
3757406d4b995a2a6e9f5b12a5ce317b84425b3534065a39705f49a5bdc0d4a9.exe
Resource
win7-20220812-en
Behavioral task
behavioral24
Sample
3757406d4b995a2a6e9f5b12a5ce317b84425b3534065a39705f49a5bdc0d4a9.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral25
Sample
39828c100cf2134d3cc8f57a9c5eb40c1206a5a339f3c60aba202eb8bf1420f5.exe
Resource
win7-20220812-en
Behavioral task
behavioral26
Sample
39828c100cf2134d3cc8f57a9c5eb40c1206a5a339f3c60aba202eb8bf1420f5.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral27
Sample
3ac3fd9de619c934b0fad04b0384898d98cd69444da2d2bbf3bdd6a7e922fce2.exe
Resource
win7-20220901-en
Behavioral task
behavioral28
Sample
3ac3fd9de619c934b0fad04b0384898d98cd69444da2d2bbf3bdd6a7e922fce2.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral29
Sample
4c0d6edc64d4af980e7fe0d01dc66380d5f0d1b1d845080a12ec74849880783f.exe
Resource
win7-20220812-en
Behavioral task
behavioral30
Sample
4c0d6edc64d4af980e7fe0d01dc66380d5f0d1b1d845080a12ec74849880783f.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral31
Sample
4fe551bcea5e07879ec84a7f1cea1036cfd0a3b03151403542cab6bd8541f8e5.exe
Resource
win7-20220812-en
General
-
Target
1463bbb2a82fb27ad4b86489b2910a8ec9c1a29cf19aaaa0da37b9217f674513.exe
-
Size
3.6MB
-
MD5
e1b3507dc15459a3d8962cead57507f9
-
SHA1
bfde4b87943f40152a6f3c13b953572ead31d22e
-
SHA256
1463bbb2a82fb27ad4b86489b2910a8ec9c1a29cf19aaaa0da37b9217f674513
-
SHA512
c8c90acb7ac2d5eac7dc1c22fd460e0fd82f8b6bdd2694e776bf05b6a81f6dabf1ce335b1bfcb40cfb50f7baeee4a822897f15714926b88a245b6e3d8cd76340
-
SSDEEP
98304:BkrXnmDty5b0KA5AaYtDri80EIhdyorHe2zj:BkrXmDltJYtNILymHe2zj
Malware Config
Signatures
-
Detect Blister loader x32 6 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\TemporaryInstall\Interfacegraphic.dll family_blister_x32 C:\Users\Admin\AppData\Local\Temp\TemporaryInstall\Interfacegraphic.dll family_blister_x32 C:\Users\Admin\AppData\Local\Temp\TemporaryInstall\guiframwork.dll family_blister_x32 C:\Users\Admin\AppData\Local\Temp\TemporaryInstall\guiframwork.dll family_blister_x32 behavioral12/memory/3440-140-0x0000000017170000-0x000000001722C000-memory.dmp family_blister_x32 behavioral12/memory/1328-141-0x0000000017170000-0x0000000017489000-memory.dmp family_blister_x32 -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 3440 rundll32.exe 1328 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
1463bbb2a82fb27ad4b86489b2910a8ec9c1a29cf19aaaa0da37b9217f674513.exeRundll32.exeRundll32.exedescription pid process target process PID 4816 wrote to memory of 3604 4816 1463bbb2a82fb27ad4b86489b2910a8ec9c1a29cf19aaaa0da37b9217f674513.exe Rundll32.exe PID 4816 wrote to memory of 3604 4816 1463bbb2a82fb27ad4b86489b2910a8ec9c1a29cf19aaaa0da37b9217f674513.exe Rundll32.exe PID 3604 wrote to memory of 3440 3604 Rundll32.exe rundll32.exe PID 3604 wrote to memory of 3440 3604 Rundll32.exe rundll32.exe PID 3604 wrote to memory of 3440 3604 Rundll32.exe rundll32.exe PID 4816 wrote to memory of 2400 4816 1463bbb2a82fb27ad4b86489b2910a8ec9c1a29cf19aaaa0da37b9217f674513.exe Rundll32.exe PID 4816 wrote to memory of 2400 4816 1463bbb2a82fb27ad4b86489b2910a8ec9c1a29cf19aaaa0da37b9217f674513.exe Rundll32.exe PID 2400 wrote to memory of 1328 2400 Rundll32.exe rundll32.exe PID 2400 wrote to memory of 1328 2400 Rundll32.exe rundll32.exe PID 2400 wrote to memory of 1328 2400 Rundll32.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1463bbb2a82fb27ad4b86489b2910a8ec9c1a29cf19aaaa0da37b9217f674513.exe"C:\Users\Admin\AppData\Local\Temp\1463bbb2a82fb27ad4b86489b2910a8ec9c1a29cf19aaaa0da37b9217f674513.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\SYSTEM32\Rundll32.exeRundll32.exe C:\Users\Admin\AppData\Local\Temp\TemporaryInstall\Interfacegraphic.dll,LaunchColorCpl2⤵
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Windows\SysWOW64\rundll32.exeRundll32.exe C:\Users\Admin\AppData\Local\Temp\TemporaryInstall\Interfacegraphic.dll,LaunchColorCpl3⤵
- Loads dropped DLL
PID:3440
-
-
-
C:\Windows\SYSTEM32\Rundll32.exeRundll32.exe C:\Users\Admin\AppData\Local\Temp\TemporaryInstall\guiframwork.dll,LaunchColorCpl2⤵
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\rundll32.exeRundll32.exe C:\Users\Admin\AppData\Local\Temp\TemporaryInstall\guiframwork.dll,LaunchColorCpl3⤵
- Loads dropped DLL
PID:1328
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
750KB
MD59603bc109dbf4ca405525aa7bee8e66e
SHA1837b8b848a7552246174537bbeb01c4cc32764f2
SHA25621912968bee6cea6929a1a3bf0330e06db3f182c07af79664dbb8a963509f20b
SHA512e39b0568be9119339c366b11157d41d7795cdaf99bbcb15193395bb3f6f9c3af4404ffd3bc20e28f5e147d576a27c8319e4fa565ed5c43ed56c72d725a9d7fac
-
Filesize
750KB
MD59603bc109dbf4ca405525aa7bee8e66e
SHA1837b8b848a7552246174537bbeb01c4cc32764f2
SHA25621912968bee6cea6929a1a3bf0330e06db3f182c07af79664dbb8a963509f20b
SHA512e39b0568be9119339c366b11157d41d7795cdaf99bbcb15193395bb3f6f9c3af4404ffd3bc20e28f5e147d576a27c8319e4fa565ed5c43ed56c72d725a9d7fac
-
Filesize
3.1MB
MD51dc30b7016ae9ba51d27624149523d9e
SHA1912a55a8fa54fa8c87602857c6d080e4e39d326b
SHA25623fc50b954bd06c256e16c61d1eda028ed00a682b8f6c6aa17a37633a6188582
SHA51207c50565352e64b1653a7303e5d9fa3ee299fd9259ea80e361e264c1c51f498b024f475bec39106e5c1386f40cc64e843aa07dac01e95055796e9d44f63236e1
-
Filesize
3.1MB
MD51dc30b7016ae9ba51d27624149523d9e
SHA1912a55a8fa54fa8c87602857c6d080e4e39d326b
SHA25623fc50b954bd06c256e16c61d1eda028ed00a682b8f6c6aa17a37633a6188582
SHA51207c50565352e64b1653a7303e5d9fa3ee299fd9259ea80e361e264c1c51f498b024f475bec39106e5c1386f40cc64e843aa07dac01e95055796e9d44f63236e1