Overview
overview
10Static
static
0494e1b88f...90.exe
windows7-x64
30494e1b88f...90.exe
windows10-2004-x64
30f41c175bc...07.exe
windows7-x64
30f41c175bc...07.exe
windows10-2004-x64
30f78cea418...13.exe
windows7-x64
30f78cea418...13.exe
windows10-2004-x64
312ffee3e2c...c5.exe
windows7-x64
312ffee3e2c...c5.exe
windows10-2004-x64
31449f8a93c...3a.exe
windows7-x64
71449f8a93c...3a.exe
windows10-2004-x64
71463bbb2a8...13.exe
windows7-x64
101463bbb2a8...13.exe
windows10-2004-x64
10148b25ad23...fa.exe
windows7-x64
7148b25ad23...fa.exe
windows10-2004-x64
71fe05e5f82...ec.exe
windows7-x64
101fe05e5f82...ec.exe
windows10-2004-x64
102a12cf13b7...8c.exe
windows7-x64
102a12cf13b7...8c.exe
windows10-2004-x64
102aaa916d56...f3.exe
windows7-x64
102aaa916d56...f3.exe
windows10-2004-x64
102b247f89f1...d0.exe
windows7-x64
72b247f89f1...d0.exe
windows10-2004-x64
73757406d4b...a9.exe
windows7-x64
33757406d4b...a9.exe
windows10-2004-x64
339828c100c...f5.exe
windows7-x64
339828c100c...f5.exe
windows10-2004-x64
33ac3fd9de6...e2.exe
windows7-x64
103ac3fd9de6...e2.exe
windows10-2004-x64
104c0d6edc64...3f.exe
windows7-x64
104c0d6edc64...3f.exe
windows10-2004-x64
104fe551bcea...e5.exe
windows7-x64
104fe551bcea...e5.exe
windows10-2004-x64
10Analysis
-
max time kernel
154s -
max time network
191s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05-09-2022 15:50
Static task
static1
Behavioral task
behavioral1
Sample
0494e1b88f4a3b69162ef51971246f87c0ad434549a802ae7d54aee954190090.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0494e1b88f4a3b69162ef51971246f87c0ad434549a802ae7d54aee954190090.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
0f41c175bc3b7e6c6688b143d5e8d037d5ce6671886fb3a10e5fcbaa6cd1cd07.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
0f41c175bc3b7e6c6688b143d5e8d037d5ce6671886fb3a10e5fcbaa6cd1cd07.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
0f78cea41852b4b219e4127e5db31404d463594d7e893c1498afe0938cf83813.exe
Resource
win7-20220901-en
Behavioral task
behavioral6
Sample
0f78cea41852b4b219e4127e5db31404d463594d7e893c1498afe0938cf83813.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
12ffee3e2c5daf4019991827cefc744154de65568c9527755bd548d0740058c5.exe
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
12ffee3e2c5daf4019991827cefc744154de65568c9527755bd548d0740058c5.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
1449f8a93c3bf1bf34091945ecce2da9e7e71b8cc7235309e37031edc801303a.exe
Resource
win7-20220901-en
Behavioral task
behavioral10
Sample
1449f8a93c3bf1bf34091945ecce2da9e7e71b8cc7235309e37031edc801303a.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
1463bbb2a82fb27ad4b86489b2910a8ec9c1a29cf19aaaa0da37b9217f674513.exe
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
1463bbb2a82fb27ad4b86489b2910a8ec9c1a29cf19aaaa0da37b9217f674513.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
148b25ad23097ace1d616a362c65706e63e392133cdda5495aaa3b70e6064ffa.exe
Resource
win7-20220901-en
Behavioral task
behavioral14
Sample
148b25ad23097ace1d616a362c65706e63e392133cdda5495aaa3b70e6064ffa.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral15
Sample
1fe05e5f8237f2c9c6b079eaf4f1e21aea96b1a092a66bf3ab9633a59c50c6ec.exe
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
1fe05e5f8237f2c9c6b079eaf4f1e21aea96b1a092a66bf3ab9633a59c50c6ec.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral17
Sample
2a12cf13b7145e1ddb3cc6b36b0716ee3563f35ba5544b1c127fb553f0a2108c.exe
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
2a12cf13b7145e1ddb3cc6b36b0716ee3563f35ba5544b1c127fb553f0a2108c.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
2aaa916d56cfe95abb65fbc222bfdfa2b16a3ffb6660c1bdc211004302a1aef3.exe
Resource
win7-20220812-en
Behavioral task
behavioral20
Sample
2aaa916d56cfe95abb65fbc222bfdfa2b16a3ffb6660c1bdc211004302a1aef3.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral21
Sample
2b247f89f132b4674e69a4403e715f7eb951278e77bdb9a9f62605d21b6df2d0.exe
Resource
win7-20220812-en
Behavioral task
behavioral22
Sample
2b247f89f132b4674e69a4403e715f7eb951278e77bdb9a9f62605d21b6df2d0.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral23
Sample
3757406d4b995a2a6e9f5b12a5ce317b84425b3534065a39705f49a5bdc0d4a9.exe
Resource
win7-20220812-en
Behavioral task
behavioral24
Sample
3757406d4b995a2a6e9f5b12a5ce317b84425b3534065a39705f49a5bdc0d4a9.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral25
Sample
39828c100cf2134d3cc8f57a9c5eb40c1206a5a339f3c60aba202eb8bf1420f5.exe
Resource
win7-20220812-en
Behavioral task
behavioral26
Sample
39828c100cf2134d3cc8f57a9c5eb40c1206a5a339f3c60aba202eb8bf1420f5.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral27
Sample
3ac3fd9de619c934b0fad04b0384898d98cd69444da2d2bbf3bdd6a7e922fce2.exe
Resource
win7-20220901-en
Behavioral task
behavioral28
Sample
3ac3fd9de619c934b0fad04b0384898d98cd69444da2d2bbf3bdd6a7e922fce2.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral29
Sample
4c0d6edc64d4af980e7fe0d01dc66380d5f0d1b1d845080a12ec74849880783f.exe
Resource
win7-20220812-en
Behavioral task
behavioral30
Sample
4c0d6edc64d4af980e7fe0d01dc66380d5f0d1b1d845080a12ec74849880783f.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral31
Sample
4fe551bcea5e07879ec84a7f1cea1036cfd0a3b03151403542cab6bd8541f8e5.exe
Resource
win7-20220812-en
General
-
Target
4c0d6edc64d4af980e7fe0d01dc66380d5f0d1b1d845080a12ec74849880783f.exe
-
Size
3.6MB
-
MD5
746232cf955a61dc7690801d4cb885e1
-
SHA1
d85fc9d92a7315826fdc0ac2b17ae00d08817c54
-
SHA256
4c0d6edc64d4af980e7fe0d01dc66380d5f0d1b1d845080a12ec74849880783f
-
SHA512
af621199f0c32dac939ea7df045fc5ae01eceffba26adb24bfe33a3cc65e50f50e54e331b0c137dcca2800b3954d8bbb21fc0db3d7bc5e6c50392ce4c1bef903
-
SSDEEP
98304:1krXnmDty5b0KA5AaYtDri80EIhdyorHe2zk:1krXmDltJYtNILymHe2zk
Malware Config
Signatures
-
Detect Blister loader x32 6 IoCs
resource yara_rule behavioral30/files/0x0008000000022f71-133.dat family_blister_x32 behavioral30/files/0x000b000000022fc1-135.dat family_blister_x32 behavioral30/files/0x0008000000022f71-138.dat family_blister_x32 behavioral30/files/0x000b000000022fc1-139.dat family_blister_x32 behavioral30/memory/3464-140-0x0000000017170000-0x000000001722C000-memory.dmp family_blister_x32 behavioral30/memory/3432-141-0x0000000017170000-0x0000000017489000-memory.dmp family_blister_x32 -
Loads dropped DLL 2 IoCs
pid Process 3464 rundll32.exe 3432 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4864 wrote to memory of 4604 4864 4c0d6edc64d4af980e7fe0d01dc66380d5f0d1b1d845080a12ec74849880783f.exe 81 PID 4864 wrote to memory of 4604 4864 4c0d6edc64d4af980e7fe0d01dc66380d5f0d1b1d845080a12ec74849880783f.exe 81 PID 4864 wrote to memory of 2316 4864 4c0d6edc64d4af980e7fe0d01dc66380d5f0d1b1d845080a12ec74849880783f.exe 82 PID 4864 wrote to memory of 2316 4864 4c0d6edc64d4af980e7fe0d01dc66380d5f0d1b1d845080a12ec74849880783f.exe 82 PID 4604 wrote to memory of 3464 4604 Rundll32.exe 84 PID 4604 wrote to memory of 3464 4604 Rundll32.exe 84 PID 4604 wrote to memory of 3464 4604 Rundll32.exe 84 PID 2316 wrote to memory of 3432 2316 Rundll32.exe 83 PID 2316 wrote to memory of 3432 2316 Rundll32.exe 83 PID 2316 wrote to memory of 3432 2316 Rundll32.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c0d6edc64d4af980e7fe0d01dc66380d5f0d1b1d845080a12ec74849880783f.exe"C:\Users\Admin\AppData\Local\Temp\4c0d6edc64d4af980e7fe0d01dc66380d5f0d1b1d845080a12ec74849880783f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Windows\SYSTEM32\Rundll32.exeRundll32.exe C:\Users\Admin\AppData\Local\Temp\TemporaryInstall\Interfacegraphic.dll,LaunchColorCpl2⤵
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\SysWOW64\rundll32.exeRundll32.exe C:\Users\Admin\AppData\Local\Temp\TemporaryInstall\Interfacegraphic.dll,LaunchColorCpl3⤵
- Loads dropped DLL
PID:3464
-
-
-
C:\Windows\SYSTEM32\Rundll32.exeRundll32.exe C:\Users\Admin\AppData\Local\Temp\TemporaryInstall\guiframwork.dll,LaunchColorCpl2⤵
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\rundll32.exeRundll32.exe C:\Users\Admin\AppData\Local\Temp\TemporaryInstall\guiframwork.dll,LaunchColorCpl3⤵
- Loads dropped DLL
PID:3432
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
750KB
MD59603bc109dbf4ca405525aa7bee8e66e
SHA1837b8b848a7552246174537bbeb01c4cc32764f2
SHA25621912968bee6cea6929a1a3bf0330e06db3f182c07af79664dbb8a963509f20b
SHA512e39b0568be9119339c366b11157d41d7795cdaf99bbcb15193395bb3f6f9c3af4404ffd3bc20e28f5e147d576a27c8319e4fa565ed5c43ed56c72d725a9d7fac
-
Filesize
750KB
MD59603bc109dbf4ca405525aa7bee8e66e
SHA1837b8b848a7552246174537bbeb01c4cc32764f2
SHA25621912968bee6cea6929a1a3bf0330e06db3f182c07af79664dbb8a963509f20b
SHA512e39b0568be9119339c366b11157d41d7795cdaf99bbcb15193395bb3f6f9c3af4404ffd3bc20e28f5e147d576a27c8319e4fa565ed5c43ed56c72d725a9d7fac
-
Filesize
3.1MB
MD51dc30b7016ae9ba51d27624149523d9e
SHA1912a55a8fa54fa8c87602857c6d080e4e39d326b
SHA25623fc50b954bd06c256e16c61d1eda028ed00a682b8f6c6aa17a37633a6188582
SHA51207c50565352e64b1653a7303e5d9fa3ee299fd9259ea80e361e264c1c51f498b024f475bec39106e5c1386f40cc64e843aa07dac01e95055796e9d44f63236e1
-
Filesize
3.1MB
MD51dc30b7016ae9ba51d27624149523d9e
SHA1912a55a8fa54fa8c87602857c6d080e4e39d326b
SHA25623fc50b954bd06c256e16c61d1eda028ed00a682b8f6c6aa17a37633a6188582
SHA51207c50565352e64b1653a7303e5d9fa3ee299fd9259ea80e361e264c1c51f498b024f475bec39106e5c1386f40cc64e843aa07dac01e95055796e9d44f63236e1