Overview
overview
10Static
static
0494e1b88f...90.exe
windows7-x64
30494e1b88f...90.exe
windows10-2004-x64
30f41c175bc...07.exe
windows7-x64
30f41c175bc...07.exe
windows10-2004-x64
30f78cea418...13.exe
windows7-x64
30f78cea418...13.exe
windows10-2004-x64
312ffee3e2c...c5.exe
windows7-x64
312ffee3e2c...c5.exe
windows10-2004-x64
31449f8a93c...3a.exe
windows7-x64
71449f8a93c...3a.exe
windows10-2004-x64
71463bbb2a8...13.exe
windows7-x64
101463bbb2a8...13.exe
windows10-2004-x64
10148b25ad23...fa.exe
windows7-x64
7148b25ad23...fa.exe
windows10-2004-x64
71fe05e5f82...ec.exe
windows7-x64
101fe05e5f82...ec.exe
windows10-2004-x64
102a12cf13b7...8c.exe
windows7-x64
102a12cf13b7...8c.exe
windows10-2004-x64
102aaa916d56...f3.exe
windows7-x64
102aaa916d56...f3.exe
windows10-2004-x64
102b247f89f1...d0.exe
windows7-x64
72b247f89f1...d0.exe
windows10-2004-x64
73757406d4b...a9.exe
windows7-x64
33757406d4b...a9.exe
windows10-2004-x64
339828c100c...f5.exe
windows7-x64
339828c100c...f5.exe
windows10-2004-x64
33ac3fd9de6...e2.exe
windows7-x64
103ac3fd9de6...e2.exe
windows10-2004-x64
104c0d6edc64...3f.exe
windows7-x64
104c0d6edc64...3f.exe
windows10-2004-x64
104fe551bcea...e5.exe
windows7-x64
104fe551bcea...e5.exe
windows10-2004-x64
10Analysis
-
max time kernel
65s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05-09-2022 15:50
Static task
static1
Behavioral task
behavioral1
Sample
0494e1b88f4a3b69162ef51971246f87c0ad434549a802ae7d54aee954190090.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0494e1b88f4a3b69162ef51971246f87c0ad434549a802ae7d54aee954190090.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
0f41c175bc3b7e6c6688b143d5e8d037d5ce6671886fb3a10e5fcbaa6cd1cd07.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
0f41c175bc3b7e6c6688b143d5e8d037d5ce6671886fb3a10e5fcbaa6cd1cd07.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
0f78cea41852b4b219e4127e5db31404d463594d7e893c1498afe0938cf83813.exe
Resource
win7-20220901-en
Behavioral task
behavioral6
Sample
0f78cea41852b4b219e4127e5db31404d463594d7e893c1498afe0938cf83813.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
12ffee3e2c5daf4019991827cefc744154de65568c9527755bd548d0740058c5.exe
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
12ffee3e2c5daf4019991827cefc744154de65568c9527755bd548d0740058c5.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
1449f8a93c3bf1bf34091945ecce2da9e7e71b8cc7235309e37031edc801303a.exe
Resource
win7-20220901-en
Behavioral task
behavioral10
Sample
1449f8a93c3bf1bf34091945ecce2da9e7e71b8cc7235309e37031edc801303a.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
1463bbb2a82fb27ad4b86489b2910a8ec9c1a29cf19aaaa0da37b9217f674513.exe
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
1463bbb2a82fb27ad4b86489b2910a8ec9c1a29cf19aaaa0da37b9217f674513.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
148b25ad23097ace1d616a362c65706e63e392133cdda5495aaa3b70e6064ffa.exe
Resource
win7-20220901-en
Behavioral task
behavioral14
Sample
148b25ad23097ace1d616a362c65706e63e392133cdda5495aaa3b70e6064ffa.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral15
Sample
1fe05e5f8237f2c9c6b079eaf4f1e21aea96b1a092a66bf3ab9633a59c50c6ec.exe
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
1fe05e5f8237f2c9c6b079eaf4f1e21aea96b1a092a66bf3ab9633a59c50c6ec.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral17
Sample
2a12cf13b7145e1ddb3cc6b36b0716ee3563f35ba5544b1c127fb553f0a2108c.exe
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
2a12cf13b7145e1ddb3cc6b36b0716ee3563f35ba5544b1c127fb553f0a2108c.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
2aaa916d56cfe95abb65fbc222bfdfa2b16a3ffb6660c1bdc211004302a1aef3.exe
Resource
win7-20220812-en
Behavioral task
behavioral20
Sample
2aaa916d56cfe95abb65fbc222bfdfa2b16a3ffb6660c1bdc211004302a1aef3.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral21
Sample
2b247f89f132b4674e69a4403e715f7eb951278e77bdb9a9f62605d21b6df2d0.exe
Resource
win7-20220812-en
Behavioral task
behavioral22
Sample
2b247f89f132b4674e69a4403e715f7eb951278e77bdb9a9f62605d21b6df2d0.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral23
Sample
3757406d4b995a2a6e9f5b12a5ce317b84425b3534065a39705f49a5bdc0d4a9.exe
Resource
win7-20220812-en
Behavioral task
behavioral24
Sample
3757406d4b995a2a6e9f5b12a5ce317b84425b3534065a39705f49a5bdc0d4a9.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral25
Sample
39828c100cf2134d3cc8f57a9c5eb40c1206a5a339f3c60aba202eb8bf1420f5.exe
Resource
win7-20220812-en
Behavioral task
behavioral26
Sample
39828c100cf2134d3cc8f57a9c5eb40c1206a5a339f3c60aba202eb8bf1420f5.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral27
Sample
3ac3fd9de619c934b0fad04b0384898d98cd69444da2d2bbf3bdd6a7e922fce2.exe
Resource
win7-20220901-en
Behavioral task
behavioral28
Sample
3ac3fd9de619c934b0fad04b0384898d98cd69444da2d2bbf3bdd6a7e922fce2.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral29
Sample
4c0d6edc64d4af980e7fe0d01dc66380d5f0d1b1d845080a12ec74849880783f.exe
Resource
win7-20220812-en
Behavioral task
behavioral30
Sample
4c0d6edc64d4af980e7fe0d01dc66380d5f0d1b1d845080a12ec74849880783f.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral31
Sample
4fe551bcea5e07879ec84a7f1cea1036cfd0a3b03151403542cab6bd8541f8e5.exe
Resource
win7-20220812-en
General
-
Target
2a12cf13b7145e1ddb3cc6b36b0716ee3563f35ba5544b1c127fb553f0a2108c.exe
-
Size
3.7MB
-
MD5
d3d82570eaa1da170db4db23dbb14e16
-
SHA1
765f698108eef0a2822471d446e1f9c66b035f2c
-
SHA256
2a12cf13b7145e1ddb3cc6b36b0716ee3563f35ba5544b1c127fb553f0a2108c
-
SHA512
fa195c32a640799870f53810e47ae340b69e230c8989a96b8019852458cecffeb68a80a9c463e97a8f9dce633a91044fdf28e84e927379acd30a74bd0ce2eb64
-
SSDEEP
98304:rxgYxM3ES6HXzYw368t/9VmCin4olv8/wO3b:ruUOIFa4oF84cb
Malware Config
Signatures
-
Detect Blister loader x32 8 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\Profilinstall\GraphicalGUI.dll family_blister_x32 \Users\Admin\AppData\Local\Temp\Profilinstall\GraphicalGUI.dll family_blister_x32 \Users\Admin\AppData\Local\Temp\Profilinstall\GraphicalGUI.dll family_blister_x32 C:\Users\Admin\AppData\Local\Temp\Profilinstall\Guicolor.dll family_blister_x32 \Users\Admin\AppData\Local\Temp\Profilinstall\Guicolor.dll family_blister_x32 \Users\Admin\AppData\Local\Temp\Profilinstall\Guicolor.dll family_blister_x32 behavioral17/memory/1792-67-0x0000000017170000-0x0000000017488000-memory.dmp family_blister_x32 behavioral17/memory/1708-68-0x0000000017170000-0x0000000017226000-memory.dmp family_blister_x32 -
Loads dropped DLL 4 IoCs
Processes:
rundll32.exerundll32.exepid process 1792 rundll32.exe 1792 rundll32.exe 1708 rundll32.exe 1708 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
2a12cf13b7145e1ddb3cc6b36b0716ee3563f35ba5544b1c127fb553f0a2108c.exeRundll32.exeRundll32.exedescription pid process target process PID 980 wrote to memory of 2020 980 2a12cf13b7145e1ddb3cc6b36b0716ee3563f35ba5544b1c127fb553f0a2108c.exe Rundll32.exe PID 980 wrote to memory of 2020 980 2a12cf13b7145e1ddb3cc6b36b0716ee3563f35ba5544b1c127fb553f0a2108c.exe Rundll32.exe PID 980 wrote to memory of 2020 980 2a12cf13b7145e1ddb3cc6b36b0716ee3563f35ba5544b1c127fb553f0a2108c.exe Rundll32.exe PID 2020 wrote to memory of 1792 2020 Rundll32.exe rundll32.exe PID 2020 wrote to memory of 1792 2020 Rundll32.exe rundll32.exe PID 2020 wrote to memory of 1792 2020 Rundll32.exe rundll32.exe PID 2020 wrote to memory of 1792 2020 Rundll32.exe rundll32.exe PID 2020 wrote to memory of 1792 2020 Rundll32.exe rundll32.exe PID 2020 wrote to memory of 1792 2020 Rundll32.exe rundll32.exe PID 2020 wrote to memory of 1792 2020 Rundll32.exe rundll32.exe PID 980 wrote to memory of 2028 980 2a12cf13b7145e1ddb3cc6b36b0716ee3563f35ba5544b1c127fb553f0a2108c.exe Rundll32.exe PID 980 wrote to memory of 2028 980 2a12cf13b7145e1ddb3cc6b36b0716ee3563f35ba5544b1c127fb553f0a2108c.exe Rundll32.exe PID 980 wrote to memory of 2028 980 2a12cf13b7145e1ddb3cc6b36b0716ee3563f35ba5544b1c127fb553f0a2108c.exe Rundll32.exe PID 2028 wrote to memory of 1708 2028 Rundll32.exe rundll32.exe PID 2028 wrote to memory of 1708 2028 Rundll32.exe rundll32.exe PID 2028 wrote to memory of 1708 2028 Rundll32.exe rundll32.exe PID 2028 wrote to memory of 1708 2028 Rundll32.exe rundll32.exe PID 2028 wrote to memory of 1708 2028 Rundll32.exe rundll32.exe PID 2028 wrote to memory of 1708 2028 Rundll32.exe rundll32.exe PID 2028 wrote to memory of 1708 2028 Rundll32.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a12cf13b7145e1ddb3cc6b36b0716ee3563f35ba5544b1c127fb553f0a2108c.exe"C:\Users\Admin\AppData\Local\Temp\2a12cf13b7145e1ddb3cc6b36b0716ee3563f35ba5544b1c127fb553f0a2108c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\system32\Rundll32.exeRundll32.exe C:\Users\Admin\AppData\Local\Temp\Profilinstall\GraphicalGUI.dll,LaunchColorCpl2⤵
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\rundll32.exeRundll32.exe C:\Users\Admin\AppData\Local\Temp\Profilinstall\GraphicalGUI.dll,LaunchColorCpl3⤵
- Loads dropped DLL
PID:1792
-
-
-
C:\Windows\system32\Rundll32.exeRundll32.exe C:\Users\Admin\AppData\Local\Temp\Profilinstall\Guicolor.dll,LaunchColorCpl2⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\rundll32.exeRundll32.exe C:\Users\Admin\AppData\Local\Temp\Profilinstall\Guicolor.dll,LaunchColorCpl3⤵
- Loads dropped DLL
PID:1708
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD57ff880c23c755a3c0ecc0493c939f4cb
SHA12945d611ccb64a3a4322f73913cc676503a872d6
SHA2568ae2c205220c95f0f7e1f67030a9027822cc18e941b669e2a52a5dbb5af74bc9
SHA51285f9a39d3e6eb547d22ad1c16d103c46a4bfac70a66cabdadb2ea3d04b4f8945d6669701907221bb19613047d78a87d47b456980a64c5b50a5f8347b205ca84b
-
Filesize
724KB
MD5c7e4751c628cf903da96c78a24f6a2aa
SHA143af06c4feb893858d7e81775ed6adbc1d49f10e
SHA256516cac58a6bfec5b9c214b6bba0b724961148199d32fb42c01b12ac31f6a6099
SHA512897bdcb72f2f6a1f6af40ede007c1b0a4e20b95a358c807d7be62e70e35179cd3feb0a73406df34b1503608411a84c4f86fe140f438f2c4f4b920d7a8446e2f1
-
Filesize
3.1MB
MD57ff880c23c755a3c0ecc0493c939f4cb
SHA12945d611ccb64a3a4322f73913cc676503a872d6
SHA2568ae2c205220c95f0f7e1f67030a9027822cc18e941b669e2a52a5dbb5af74bc9
SHA51285f9a39d3e6eb547d22ad1c16d103c46a4bfac70a66cabdadb2ea3d04b4f8945d6669701907221bb19613047d78a87d47b456980a64c5b50a5f8347b205ca84b
-
Filesize
3.1MB
MD57ff880c23c755a3c0ecc0493c939f4cb
SHA12945d611ccb64a3a4322f73913cc676503a872d6
SHA2568ae2c205220c95f0f7e1f67030a9027822cc18e941b669e2a52a5dbb5af74bc9
SHA51285f9a39d3e6eb547d22ad1c16d103c46a4bfac70a66cabdadb2ea3d04b4f8945d6669701907221bb19613047d78a87d47b456980a64c5b50a5f8347b205ca84b
-
Filesize
724KB
MD5c7e4751c628cf903da96c78a24f6a2aa
SHA143af06c4feb893858d7e81775ed6adbc1d49f10e
SHA256516cac58a6bfec5b9c214b6bba0b724961148199d32fb42c01b12ac31f6a6099
SHA512897bdcb72f2f6a1f6af40ede007c1b0a4e20b95a358c807d7be62e70e35179cd3feb0a73406df34b1503608411a84c4f86fe140f438f2c4f4b920d7a8446e2f1
-
Filesize
724KB
MD5c7e4751c628cf903da96c78a24f6a2aa
SHA143af06c4feb893858d7e81775ed6adbc1d49f10e
SHA256516cac58a6bfec5b9c214b6bba0b724961148199d32fb42c01b12ac31f6a6099
SHA512897bdcb72f2f6a1f6af40ede007c1b0a4e20b95a358c807d7be62e70e35179cd3feb0a73406df34b1503608411a84c4f86fe140f438f2c4f4b920d7a8446e2f1