Analysis

  • max time kernel
    37s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05-09-2022 15:50

General

  • Target

    1fe05e5f8237f2c9c6b079eaf4f1e21aea96b1a092a66bf3ab9633a59c50c6ec.exe

  • Size

    3.0MB

  • MD5

    9dfa2a3209ce891b5eec9d4842333be4

  • SHA1

    fb99c6ca952a0c01f612558949af0013147e29dc

  • SHA256

    1fe05e5f8237f2c9c6b079eaf4f1e21aea96b1a092a66bf3ab9633a59c50c6ec

  • SHA512

    5b01d24a38720b0a4cbbd73a832cd0eadeb3780afa56bb0b76f1b5883c64bf50e8fffdf8e7d3147316dba93fe66911779a7c57327c48dc816078a63fae0f2814

  • SSDEEP

    98304:MwM1roHir0Z7ENrna5AT/qDj6v3lBu7fWlM:MwM1sHW0ZI+AjqX6v3lByeS

Score
10/10

Malware Config

Signatures

  • BLISTER

    BLISTER is a downloader used to deliver other malware families.

  • Detect Blister loader x32 5 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1fe05e5f8237f2c9c6b079eaf4f1e21aea96b1a092a66bf3ab9633a59c50c6ec.exe
    "C:\Users\Admin\AppData\Local\Temp\1fe05e5f8237f2c9c6b079eaf4f1e21aea96b1a092a66bf3ab9633a59c50c6ec.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1172
    • C:\Windows\system32\Rundll32.exe
      Rundll32.exe C:\Users\Admin\AppData\Local\Temp\lib_npp\libcef.dll,cef_request_create
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1992
      • C:\Windows\SysWOW64\rundll32.exe
        Rundll32.exe C:\Users\Admin\AppData\Local\Temp\lib_npp\libcef.dll,cef_request_create
        3⤵
        • Loads dropped DLL
        PID:2020

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lib_npp\libcef.dll

    Filesize

    23.4MB

    MD5

    c71c924a43a18b3a640d671b42120857

    SHA1

    7a386c1f47e8e1ef9570b9da4ca1d7434a887a6f

    SHA256

    5651e8a8e6f9c63c4c1162efadfcb4cdd9ad634c5e00a5ab03259fcdeaa225ac

    SHA512

    43dc58c8c3b4edaca27e86286dd4281b7dcc57db9b66e9b9fcc055420b44a54a94c32cce20dfb2cabf791d8e8e9e83a3654a94e1fb2a14bd62b955191e95b311

  • \Users\Admin\AppData\Local\Temp\lib_npp\libcef.dll

    Filesize

    23.4MB

    MD5

    c71c924a43a18b3a640d671b42120857

    SHA1

    7a386c1f47e8e1ef9570b9da4ca1d7434a887a6f

    SHA256

    5651e8a8e6f9c63c4c1162efadfcb4cdd9ad634c5e00a5ab03259fcdeaa225ac

    SHA512

    43dc58c8c3b4edaca27e86286dd4281b7dcc57db9b66e9b9fcc055420b44a54a94c32cce20dfb2cabf791d8e8e9e83a3654a94e1fb2a14bd62b955191e95b311

  • \Users\Admin\AppData\Local\Temp\lib_npp\libcef.dll

    Filesize

    23.4MB

    MD5

    c71c924a43a18b3a640d671b42120857

    SHA1

    7a386c1f47e8e1ef9570b9da4ca1d7434a887a6f

    SHA256

    5651e8a8e6f9c63c4c1162efadfcb4cdd9ad634c5e00a5ab03259fcdeaa225ac

    SHA512

    43dc58c8c3b4edaca27e86286dd4281b7dcc57db9b66e9b9fcc055420b44a54a94c32cce20dfb2cabf791d8e8e9e83a3654a94e1fb2a14bd62b955191e95b311

  • \Users\Admin\AppData\Local\Temp\lib_npp\libcef.dll

    Filesize

    23.4MB

    MD5

    c71c924a43a18b3a640d671b42120857

    SHA1

    7a386c1f47e8e1ef9570b9da4ca1d7434a887a6f

    SHA256

    5651e8a8e6f9c63c4c1162efadfcb4cdd9ad634c5e00a5ab03259fcdeaa225ac

    SHA512

    43dc58c8c3b4edaca27e86286dd4281b7dcc57db9b66e9b9fcc055420b44a54a94c32cce20dfb2cabf791d8e8e9e83a3654a94e1fb2a14bd62b955191e95b311

  • \Users\Admin\AppData\Local\Temp\lib_npp\libcef.dll

    Filesize

    23.4MB

    MD5

    c71c924a43a18b3a640d671b42120857

    SHA1

    7a386c1f47e8e1ef9570b9da4ca1d7434a887a6f

    SHA256

    5651e8a8e6f9c63c4c1162efadfcb4cdd9ad634c5e00a5ab03259fcdeaa225ac

    SHA512

    43dc58c8c3b4edaca27e86286dd4281b7dcc57db9b66e9b9fcc055420b44a54a94c32cce20dfb2cabf791d8e8e9e83a3654a94e1fb2a14bd62b955191e95b311

  • memory/1172-54-0x000007FEFB5C1000-0x000007FEFB5C3000-memory.dmp

    Filesize

    8KB

  • memory/1992-55-0x0000000000000000-mapping.dmp

  • memory/2020-57-0x0000000000000000-mapping.dmp

  • memory/2020-58-0x0000000075571000-0x0000000075573000-memory.dmp

    Filesize

    8KB