Analysis

  • max time kernel
    40s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05-09-2022 15:50

General

  • Target

    2aaa916d56cfe95abb65fbc222bfdfa2b16a3ffb6660c1bdc211004302a1aef3.exe

  • Size

    1.1MB

  • MD5

    70f3bf9c31361ebe3e39afc4f05fa160

  • SHA1

    0d1c448b739b18d0e277f2db264b7a6d3d957edd

  • SHA256

    2aaa916d56cfe95abb65fbc222bfdfa2b16a3ffb6660c1bdc211004302a1aef3

  • SHA512

    2f1f64c8a20bc753232f7ce912f8dca36db06338df81393b95434dd5e5e60b9fd11aca3f61105eec3eb2c8bd8fd13a31d7bd6713e1e098ea251ae4511cb821f2

  • SSDEEP

    24576:RXwmJ5CbuufVhiKWaoqdk5Tzq47Do4yykwA5BGeudzNd:llJ4budTzqScwAWeuZNd

Score
10/10

Malware Config

Signatures

  • BLISTER

    BLISTER is a downloader used to deliver other malware families.

  • Detect Blister loader x32 6 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2aaa916d56cfe95abb65fbc222bfdfa2b16a3ffb6660c1bdc211004302a1aef3.exe
    "C:\Users\Admin\AppData\Local\Temp\2aaa916d56cfe95abb65fbc222bfdfa2b16a3ffb6660c1bdc211004302a1aef3.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1848
    • C:\Windows\system32\Rundll32.exe
      Rundll32.exe C:\Users\Admin\AppData\Local\Temp\rdpencom_tmp\rdpencom.dll,DllUnregisterServer
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:968
      • C:\Windows\SysWOW64\rundll32.exe
        Rundll32.exe C:\Users\Admin\AppData\Local\Temp\rdpencom_tmp\rdpencom.dll,DllUnregisterServer
        3⤵
        • Loads dropped DLL
        PID:960

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rdpencom_tmp\rdpencom.dll

    Filesize

    1.2MB

    MD5

    a6d49b646ed61b91bcfe9c2170b258cd

    SHA1

    75c7cdddfbf538f51da8b74cbad11c302206750e

    SHA256

    c0f3b27ae4f7db457a86a38244225cca35aa0960eb6a685ed350e99a36c32b61

    SHA512

    18be0707af33a9c4e3b9c57e7c6a3a00b0a249acf606ccb7cc0d968a722637e8bfdc4f7d09da208cd9477ef915fd019ff171df8977c55481093c35d0ccf6a2cc

  • \Users\Admin\AppData\Local\Temp\rdpencom_tmp\rdpencom.dll

    Filesize

    1.2MB

    MD5

    a6d49b646ed61b91bcfe9c2170b258cd

    SHA1

    75c7cdddfbf538f51da8b74cbad11c302206750e

    SHA256

    c0f3b27ae4f7db457a86a38244225cca35aa0960eb6a685ed350e99a36c32b61

    SHA512

    18be0707af33a9c4e3b9c57e7c6a3a00b0a249acf606ccb7cc0d968a722637e8bfdc4f7d09da208cd9477ef915fd019ff171df8977c55481093c35d0ccf6a2cc

  • \Users\Admin\AppData\Local\Temp\rdpencom_tmp\rdpencom.dll

    Filesize

    1.2MB

    MD5

    a6d49b646ed61b91bcfe9c2170b258cd

    SHA1

    75c7cdddfbf538f51da8b74cbad11c302206750e

    SHA256

    c0f3b27ae4f7db457a86a38244225cca35aa0960eb6a685ed350e99a36c32b61

    SHA512

    18be0707af33a9c4e3b9c57e7c6a3a00b0a249acf606ccb7cc0d968a722637e8bfdc4f7d09da208cd9477ef915fd019ff171df8977c55481093c35d0ccf6a2cc

  • \Users\Admin\AppData\Local\Temp\rdpencom_tmp\rdpencom.dll

    Filesize

    1.2MB

    MD5

    a6d49b646ed61b91bcfe9c2170b258cd

    SHA1

    75c7cdddfbf538f51da8b74cbad11c302206750e

    SHA256

    c0f3b27ae4f7db457a86a38244225cca35aa0960eb6a685ed350e99a36c32b61

    SHA512

    18be0707af33a9c4e3b9c57e7c6a3a00b0a249acf606ccb7cc0d968a722637e8bfdc4f7d09da208cd9477ef915fd019ff171df8977c55481093c35d0ccf6a2cc

  • \Users\Admin\AppData\Local\Temp\rdpencom_tmp\rdpencom.dll

    Filesize

    1.2MB

    MD5

    a6d49b646ed61b91bcfe9c2170b258cd

    SHA1

    75c7cdddfbf538f51da8b74cbad11c302206750e

    SHA256

    c0f3b27ae4f7db457a86a38244225cca35aa0960eb6a685ed350e99a36c32b61

    SHA512

    18be0707af33a9c4e3b9c57e7c6a3a00b0a249acf606ccb7cc0d968a722637e8bfdc4f7d09da208cd9477ef915fd019ff171df8977c55481093c35d0ccf6a2cc

  • memory/960-57-0x0000000000000000-mapping.dmp

  • memory/960-58-0x0000000076091000-0x0000000076093000-memory.dmp

    Filesize

    8KB

  • memory/960-63-0x0000000074800000-0x0000000074930000-memory.dmp

    Filesize

    1.2MB

  • memory/968-55-0x0000000000000000-mapping.dmp

  • memory/1848-54-0x000007FEFBCA1000-0x000007FEFBCA3000-memory.dmp

    Filesize

    8KB