Analysis

  • max time kernel
    149s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-09-2022 15:50

General

  • Target

    2a12cf13b7145e1ddb3cc6b36b0716ee3563f35ba5544b1c127fb553f0a2108c.exe

  • Size

    3.7MB

  • MD5

    d3d82570eaa1da170db4db23dbb14e16

  • SHA1

    765f698108eef0a2822471d446e1f9c66b035f2c

  • SHA256

    2a12cf13b7145e1ddb3cc6b36b0716ee3563f35ba5544b1c127fb553f0a2108c

  • SHA512

    fa195c32a640799870f53810e47ae340b69e230c8989a96b8019852458cecffeb68a80a9c463e97a8f9dce633a91044fdf28e84e927379acd30a74bd0ce2eb64

  • SSDEEP

    98304:rxgYxM3ES6HXzYw368t/9VmCin4olv8/wO3b:ruUOIFa4oF84cb

Score
10/10

Malware Config

Signatures

  • BLISTER

    BLISTER is a downloader used to deliver other malware families.

  • Detect Blister loader x32 6 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a12cf13b7145e1ddb3cc6b36b0716ee3563f35ba5544b1c127fb553f0a2108c.exe
    "C:\Users\Admin\AppData\Local\Temp\2a12cf13b7145e1ddb3cc6b36b0716ee3563f35ba5544b1c127fb553f0a2108c.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4960
    • C:\Windows\SYSTEM32\Rundll32.exe
      Rundll32.exe C:\Users\Admin\AppData\Local\Temp\Profilinstall\GraphicalGUI.dll,LaunchColorCpl
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4876
      • C:\Windows\SysWOW64\rundll32.exe
        Rundll32.exe C:\Users\Admin\AppData\Local\Temp\Profilinstall\GraphicalGUI.dll,LaunchColorCpl
        3⤵
        • Loads dropped DLL
        PID:3292
    • C:\Windows\SYSTEM32\Rundll32.exe
      Rundll32.exe C:\Users\Admin\AppData\Local\Temp\Profilinstall\Guicolor.dll,LaunchColorCpl
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4816
      • C:\Windows\SysWOW64\rundll32.exe
        Rundll32.exe C:\Users\Admin\AppData\Local\Temp\Profilinstall\Guicolor.dll,LaunchColorCpl
        3⤵
        • Loads dropped DLL
        PID:2708

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Profilinstall\GraphicalGUI.dll

    Filesize

    3.1MB

    MD5

    7ff880c23c755a3c0ecc0493c939f4cb

    SHA1

    2945d611ccb64a3a4322f73913cc676503a872d6

    SHA256

    8ae2c205220c95f0f7e1f67030a9027822cc18e941b669e2a52a5dbb5af74bc9

    SHA512

    85f9a39d3e6eb547d22ad1c16d103c46a4bfac70a66cabdadb2ea3d04b4f8945d6669701907221bb19613047d78a87d47b456980a64c5b50a5f8347b205ca84b

  • C:\Users\Admin\AppData\Local\Temp\Profilinstall\GraphicalGUI.dll

    Filesize

    3.1MB

    MD5

    7ff880c23c755a3c0ecc0493c939f4cb

    SHA1

    2945d611ccb64a3a4322f73913cc676503a872d6

    SHA256

    8ae2c205220c95f0f7e1f67030a9027822cc18e941b669e2a52a5dbb5af74bc9

    SHA512

    85f9a39d3e6eb547d22ad1c16d103c46a4bfac70a66cabdadb2ea3d04b4f8945d6669701907221bb19613047d78a87d47b456980a64c5b50a5f8347b205ca84b

  • C:\Users\Admin\AppData\Local\Temp\Profilinstall\Guicolor.dll

    Filesize

    724KB

    MD5

    c7e4751c628cf903da96c78a24f6a2aa

    SHA1

    43af06c4feb893858d7e81775ed6adbc1d49f10e

    SHA256

    516cac58a6bfec5b9c214b6bba0b724961148199d32fb42c01b12ac31f6a6099

    SHA512

    897bdcb72f2f6a1f6af40ede007c1b0a4e20b95a358c807d7be62e70e35179cd3feb0a73406df34b1503608411a84c4f86fe140f438f2c4f4b920d7a8446e2f1

  • C:\Users\Admin\AppData\Local\Temp\Profilinstall\Guicolor.dll

    Filesize

    724KB

    MD5

    c7e4751c628cf903da96c78a24f6a2aa

    SHA1

    43af06c4feb893858d7e81775ed6adbc1d49f10e

    SHA256

    516cac58a6bfec5b9c214b6bba0b724961148199d32fb42c01b12ac31f6a6099

    SHA512

    897bdcb72f2f6a1f6af40ede007c1b0a4e20b95a358c807d7be62e70e35179cd3feb0a73406df34b1503608411a84c4f86fe140f438f2c4f4b920d7a8446e2f1

  • memory/2708-138-0x0000000000000000-mapping.dmp

  • memory/2708-141-0x0000000017170000-0x0000000017226000-memory.dmp

    Filesize

    728KB

  • memory/3292-134-0x0000000000000000-mapping.dmp

  • memory/3292-140-0x0000000017170000-0x0000000017488000-memory.dmp

    Filesize

    3.1MB

  • memory/4816-136-0x0000000000000000-mapping.dmp

  • memory/4876-132-0x0000000000000000-mapping.dmp