Overview
overview
10Static
static
0494e1b88f...90.exe
windows7-x64
30494e1b88f...90.exe
windows10-2004-x64
30f41c175bc...07.exe
windows7-x64
30f41c175bc...07.exe
windows10-2004-x64
30f78cea418...13.exe
windows7-x64
30f78cea418...13.exe
windows10-2004-x64
312ffee3e2c...c5.exe
windows7-x64
312ffee3e2c...c5.exe
windows10-2004-x64
31449f8a93c...3a.exe
windows7-x64
71449f8a93c...3a.exe
windows10-2004-x64
71463bbb2a8...13.exe
windows7-x64
101463bbb2a8...13.exe
windows10-2004-x64
10148b25ad23...fa.exe
windows7-x64
7148b25ad23...fa.exe
windows10-2004-x64
71fe05e5f82...ec.exe
windows7-x64
101fe05e5f82...ec.exe
windows10-2004-x64
102a12cf13b7...8c.exe
windows7-x64
102a12cf13b7...8c.exe
windows10-2004-x64
102aaa916d56...f3.exe
windows7-x64
102aaa916d56...f3.exe
windows10-2004-x64
102b247f89f1...d0.exe
windows7-x64
72b247f89f1...d0.exe
windows10-2004-x64
73757406d4b...a9.exe
windows7-x64
33757406d4b...a9.exe
windows10-2004-x64
339828c100c...f5.exe
windows7-x64
339828c100c...f5.exe
windows10-2004-x64
33ac3fd9de6...e2.exe
windows7-x64
103ac3fd9de6...e2.exe
windows10-2004-x64
104c0d6edc64...3f.exe
windows7-x64
104c0d6edc64...3f.exe
windows10-2004-x64
104fe551bcea...e5.exe
windows7-x64
104fe551bcea...e5.exe
windows10-2004-x64
10Analysis
-
max time kernel
37s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05-09-2022 15:50
Static task
static1
Behavioral task
behavioral1
Sample
0494e1b88f4a3b69162ef51971246f87c0ad434549a802ae7d54aee954190090.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0494e1b88f4a3b69162ef51971246f87c0ad434549a802ae7d54aee954190090.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
0f41c175bc3b7e6c6688b143d5e8d037d5ce6671886fb3a10e5fcbaa6cd1cd07.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
0f41c175bc3b7e6c6688b143d5e8d037d5ce6671886fb3a10e5fcbaa6cd1cd07.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
0f78cea41852b4b219e4127e5db31404d463594d7e893c1498afe0938cf83813.exe
Resource
win7-20220901-en
Behavioral task
behavioral6
Sample
0f78cea41852b4b219e4127e5db31404d463594d7e893c1498afe0938cf83813.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
12ffee3e2c5daf4019991827cefc744154de65568c9527755bd548d0740058c5.exe
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
12ffee3e2c5daf4019991827cefc744154de65568c9527755bd548d0740058c5.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
1449f8a93c3bf1bf34091945ecce2da9e7e71b8cc7235309e37031edc801303a.exe
Resource
win7-20220901-en
Behavioral task
behavioral10
Sample
1449f8a93c3bf1bf34091945ecce2da9e7e71b8cc7235309e37031edc801303a.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
1463bbb2a82fb27ad4b86489b2910a8ec9c1a29cf19aaaa0da37b9217f674513.exe
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
1463bbb2a82fb27ad4b86489b2910a8ec9c1a29cf19aaaa0da37b9217f674513.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
148b25ad23097ace1d616a362c65706e63e392133cdda5495aaa3b70e6064ffa.exe
Resource
win7-20220901-en
Behavioral task
behavioral14
Sample
148b25ad23097ace1d616a362c65706e63e392133cdda5495aaa3b70e6064ffa.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral15
Sample
1fe05e5f8237f2c9c6b079eaf4f1e21aea96b1a092a66bf3ab9633a59c50c6ec.exe
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
1fe05e5f8237f2c9c6b079eaf4f1e21aea96b1a092a66bf3ab9633a59c50c6ec.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral17
Sample
2a12cf13b7145e1ddb3cc6b36b0716ee3563f35ba5544b1c127fb553f0a2108c.exe
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
2a12cf13b7145e1ddb3cc6b36b0716ee3563f35ba5544b1c127fb553f0a2108c.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
2aaa916d56cfe95abb65fbc222bfdfa2b16a3ffb6660c1bdc211004302a1aef3.exe
Resource
win7-20220812-en
Behavioral task
behavioral20
Sample
2aaa916d56cfe95abb65fbc222bfdfa2b16a3ffb6660c1bdc211004302a1aef3.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral21
Sample
2b247f89f132b4674e69a4403e715f7eb951278e77bdb9a9f62605d21b6df2d0.exe
Resource
win7-20220812-en
Behavioral task
behavioral22
Sample
2b247f89f132b4674e69a4403e715f7eb951278e77bdb9a9f62605d21b6df2d0.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral23
Sample
3757406d4b995a2a6e9f5b12a5ce317b84425b3534065a39705f49a5bdc0d4a9.exe
Resource
win7-20220812-en
Behavioral task
behavioral24
Sample
3757406d4b995a2a6e9f5b12a5ce317b84425b3534065a39705f49a5bdc0d4a9.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral25
Sample
39828c100cf2134d3cc8f57a9c5eb40c1206a5a339f3c60aba202eb8bf1420f5.exe
Resource
win7-20220812-en
Behavioral task
behavioral26
Sample
39828c100cf2134d3cc8f57a9c5eb40c1206a5a339f3c60aba202eb8bf1420f5.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral27
Sample
3ac3fd9de619c934b0fad04b0384898d98cd69444da2d2bbf3bdd6a7e922fce2.exe
Resource
win7-20220901-en
Behavioral task
behavioral28
Sample
3ac3fd9de619c934b0fad04b0384898d98cd69444da2d2bbf3bdd6a7e922fce2.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral29
Sample
4c0d6edc64d4af980e7fe0d01dc66380d5f0d1b1d845080a12ec74849880783f.exe
Resource
win7-20220812-en
Behavioral task
behavioral30
Sample
4c0d6edc64d4af980e7fe0d01dc66380d5f0d1b1d845080a12ec74849880783f.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral31
Sample
4fe551bcea5e07879ec84a7f1cea1036cfd0a3b03151403542cab6bd8541f8e5.exe
Resource
win7-20220812-en
General
-
Target
1fe05e5f8237f2c9c6b079eaf4f1e21aea96b1a092a66bf3ab9633a59c50c6ec.exe
-
Size
3.0MB
-
MD5
9dfa2a3209ce891b5eec9d4842333be4
-
SHA1
fb99c6ca952a0c01f612558949af0013147e29dc
-
SHA256
1fe05e5f8237f2c9c6b079eaf4f1e21aea96b1a092a66bf3ab9633a59c50c6ec
-
SHA512
5b01d24a38720b0a4cbbd73a832cd0eadeb3780afa56bb0b76f1b5883c64bf50e8fffdf8e7d3147316dba93fe66911779a7c57327c48dc816078a63fae0f2814
-
SSDEEP
98304:MwM1roHir0Z7ENrna5AT/qDj6v3lBu7fWlM:MwM1sHW0ZI+AjqX6v3lByeS
Malware Config
Signatures
-
Detect Blister loader x32 5 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\lib_npp\libcef.dll family_blister_x32 \Users\Admin\AppData\Local\Temp\lib_npp\libcef.dll family_blister_x32 \Users\Admin\AppData\Local\Temp\lib_npp\libcef.dll family_blister_x32 \Users\Admin\AppData\Local\Temp\lib_npp\libcef.dll family_blister_x32 \Users\Admin\AppData\Local\Temp\lib_npp\libcef.dll family_blister_x32 -
Loads dropped DLL 4 IoCs
Processes:
rundll32.exepid process 2020 rundll32.exe 2020 rundll32.exe 2020 rundll32.exe 2020 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
1fe05e5f8237f2c9c6b079eaf4f1e21aea96b1a092a66bf3ab9633a59c50c6ec.exeRundll32.exedescription pid process target process PID 1172 wrote to memory of 1992 1172 1fe05e5f8237f2c9c6b079eaf4f1e21aea96b1a092a66bf3ab9633a59c50c6ec.exe Rundll32.exe PID 1172 wrote to memory of 1992 1172 1fe05e5f8237f2c9c6b079eaf4f1e21aea96b1a092a66bf3ab9633a59c50c6ec.exe Rundll32.exe PID 1172 wrote to memory of 1992 1172 1fe05e5f8237f2c9c6b079eaf4f1e21aea96b1a092a66bf3ab9633a59c50c6ec.exe Rundll32.exe PID 1992 wrote to memory of 2020 1992 Rundll32.exe rundll32.exe PID 1992 wrote to memory of 2020 1992 Rundll32.exe rundll32.exe PID 1992 wrote to memory of 2020 1992 Rundll32.exe rundll32.exe PID 1992 wrote to memory of 2020 1992 Rundll32.exe rundll32.exe PID 1992 wrote to memory of 2020 1992 Rundll32.exe rundll32.exe PID 1992 wrote to memory of 2020 1992 Rundll32.exe rundll32.exe PID 1992 wrote to memory of 2020 1992 Rundll32.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1fe05e5f8237f2c9c6b079eaf4f1e21aea96b1a092a66bf3ab9633a59c50c6ec.exe"C:\Users\Admin\AppData\Local\Temp\1fe05e5f8237f2c9c6b079eaf4f1e21aea96b1a092a66bf3ab9633a59c50c6ec.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\system32\Rundll32.exeRundll32.exe C:\Users\Admin\AppData\Local\Temp\lib_npp\libcef.dll,cef_request_create2⤵
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\rundll32.exeRundll32.exe C:\Users\Admin\AppData\Local\Temp\lib_npp\libcef.dll,cef_request_create3⤵
- Loads dropped DLL
PID:2020
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23.4MB
MD5c71c924a43a18b3a640d671b42120857
SHA17a386c1f47e8e1ef9570b9da4ca1d7434a887a6f
SHA2565651e8a8e6f9c63c4c1162efadfcb4cdd9ad634c5e00a5ab03259fcdeaa225ac
SHA51243dc58c8c3b4edaca27e86286dd4281b7dcc57db9b66e9b9fcc055420b44a54a94c32cce20dfb2cabf791d8e8e9e83a3654a94e1fb2a14bd62b955191e95b311
-
Filesize
23.4MB
MD5c71c924a43a18b3a640d671b42120857
SHA17a386c1f47e8e1ef9570b9da4ca1d7434a887a6f
SHA2565651e8a8e6f9c63c4c1162efadfcb4cdd9ad634c5e00a5ab03259fcdeaa225ac
SHA51243dc58c8c3b4edaca27e86286dd4281b7dcc57db9b66e9b9fcc055420b44a54a94c32cce20dfb2cabf791d8e8e9e83a3654a94e1fb2a14bd62b955191e95b311
-
Filesize
23.4MB
MD5c71c924a43a18b3a640d671b42120857
SHA17a386c1f47e8e1ef9570b9da4ca1d7434a887a6f
SHA2565651e8a8e6f9c63c4c1162efadfcb4cdd9ad634c5e00a5ab03259fcdeaa225ac
SHA51243dc58c8c3b4edaca27e86286dd4281b7dcc57db9b66e9b9fcc055420b44a54a94c32cce20dfb2cabf791d8e8e9e83a3654a94e1fb2a14bd62b955191e95b311
-
Filesize
23.4MB
MD5c71c924a43a18b3a640d671b42120857
SHA17a386c1f47e8e1ef9570b9da4ca1d7434a887a6f
SHA2565651e8a8e6f9c63c4c1162efadfcb4cdd9ad634c5e00a5ab03259fcdeaa225ac
SHA51243dc58c8c3b4edaca27e86286dd4281b7dcc57db9b66e9b9fcc055420b44a54a94c32cce20dfb2cabf791d8e8e9e83a3654a94e1fb2a14bd62b955191e95b311
-
Filesize
23.4MB
MD5c71c924a43a18b3a640d671b42120857
SHA17a386c1f47e8e1ef9570b9da4ca1d7434a887a6f
SHA2565651e8a8e6f9c63c4c1162efadfcb4cdd9ad634c5e00a5ab03259fcdeaa225ac
SHA51243dc58c8c3b4edaca27e86286dd4281b7dcc57db9b66e9b9fcc055420b44a54a94c32cce20dfb2cabf791d8e8e9e83a3654a94e1fb2a14bd62b955191e95b311