Overview
overview
10Static
static
a0cc60b4fa...0f.exe
windows7-x64
3a0cc60b4fa...0f.exe
windows10-2004-x64
3a69cf4fa61...7f.exe
windows7-x64
10a69cf4fa61...7f.exe
windows10-2004-x64
10a6dbbf3d86...75.exe
windows7-x64
7a6dbbf3d86...75.exe
windows10-2004-x64
7a783bb9edd...09.exe
windows7-x64
10a783bb9edd...09.exe
windows10-2004-x64
10ac89e5c3ba...5a.exe
windows7-x64
10ac89e5c3ba...5a.exe
windows10-2004-x64
10b6d4c3b56c...24.exe
windows7-x64
3b6d4c3b56c...24.exe
windows10-2004-x64
3b91eb833de...81.exe
windows7-x64
10b91eb833de...81.exe
windows10-2004-x64
10b959b003c1...74.exe
windows7-x64
10b959b003c1...74.exe
windows10-2004-x64
10ba8824a7c7...63.exe
windows7-x64
7ba8824a7c7...63.exe
windows10-2004-x64
7c0f1ebcca8...4a.exe
windows7-x64
10c0f1ebcca8...4a.exe
windows10-2004-x64
10c3117be60e...ea.exe
windows7-x64
10c3117be60e...ea.exe
windows10-2004-x64
10c492754e6c...ef.exe
windows7-x64
3c492754e6c...ef.exe
windows10-2004-x64
3c9cc4d95ca...cd.exe
windows7-x64
10c9cc4d95ca...cd.exe
windows10-2004-x64
10ca4a22ce76...20.exe
windows7-x64
10ca4a22ce76...20.exe
windows10-2004-x64
10cb949ebe87...26.exe
windows7-x64
10cb949ebe87...26.exe
windows10-2004-x64
10cbc0718c3c...99.exe
windows7-x64
10cbc0718c3c...99.exe
windows10-2004-x64
10Analysis
-
max time kernel
73s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05-09-2022 15:53
Static task
static1
Behavioral task
behavioral1
Sample
a0cc60b4fa8f29f5410424687c8f3e60b7f7b63c632fb506d2a42be45264de0f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a0cc60b4fa8f29f5410424687c8f3e60b7f7b63c632fb506d2a42be45264de0f.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
a69cf4fa61217f8230e032089a8f56f7ebf31e4cd35124e6ad104db86851f17f.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
a69cf4fa61217f8230e032089a8f56f7ebf31e4cd35124e6ad104db86851f17f.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
a6dbbf3d861bcc796d59c88856aa1537ad9929bb48026eade107b1ab504dbf75.exe
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
a6dbbf3d861bcc796d59c88856aa1537ad9929bb48026eade107b1ab504dbf75.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral7
Sample
a783bb9eddc40876a80504615a40e65649b910eeb0b5041ca7e8635d39b1d209.exe
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
a783bb9eddc40876a80504615a40e65649b910eeb0b5041ca7e8635d39b1d209.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
ac89e5c3ba69bb41f4bb4bb7f7af39514b5a211ec6b641d45408777b30c75c5a.exe
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
ac89e5c3ba69bb41f4bb4bb7f7af39514b5a211ec6b641d45408777b30c75c5a.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral11
Sample
b6d4c3b56c0b12a12ff0e2baee3f46f4683f9e33a780c9631b61cf755eebc024.exe
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
b6d4c3b56c0b12a12ff0e2baee3f46f4683f9e33a780c9631b61cf755eebc024.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
b91eb833de386ea3d73d2954f0dce9fe38e4bf96594620af6c0935b9ee0d7e81.exe
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
b91eb833de386ea3d73d2954f0dce9fe38e4bf96594620af6c0935b9ee0d7e81.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral15
Sample
b959b003c1e558ff0ccf1d0f96509b155d6f86eb20caa97b470f3422494d8d74.exe
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
b959b003c1e558ff0ccf1d0f96509b155d6f86eb20caa97b470f3422494d8d74.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral17
Sample
ba8824a7c7b7db0f89d566719b6a2c0893158b37b5ac45dd138acbdf6d7e9d63.exe
Resource
win7-20220901-en
Behavioral task
behavioral18
Sample
ba8824a7c7b7db0f89d566719b6a2c0893158b37b5ac45dd138acbdf6d7e9d63.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
c0f1ebcca8a8094853aa65210ddde80f6a9ffe7b3f2d75d5652b166722b3aa4a.exe
Resource
win7-20220812-en
Behavioral task
behavioral20
Sample
c0f1ebcca8a8094853aa65210ddde80f6a9ffe7b3f2d75d5652b166722b3aa4a.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral21
Sample
c3117be60ef780dc86581052b5e3f72969bef6471c7218e35beec60d167eb4ea.exe
Resource
win7-20220812-en
Behavioral task
behavioral22
Sample
c3117be60ef780dc86581052b5e3f72969bef6471c7218e35beec60d167eb4ea.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral23
Sample
c492754e6c21e22732ad1188c511745a3eea064696dc7f351d66e3c92bd63cef.exe
Resource
win7-20220901-en
Behavioral task
behavioral24
Sample
c492754e6c21e22732ad1188c511745a3eea064696dc7f351d66e3c92bd63cef.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral25
Sample
c9cc4d95ca1197328a743a41b09c2375d54ac97fcdde5e07bda660396710eccd.exe
Resource
win7-20220812-en
Behavioral task
behavioral26
Sample
c9cc4d95ca1197328a743a41b09c2375d54ac97fcdde5e07bda660396710eccd.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral27
Sample
ca4a22ce761737a04ebdba0fd8063a81642d7d96fea052c8debe9acf7791df20.exe
Resource
win7-20220901-en
Behavioral task
behavioral28
Sample
ca4a22ce761737a04ebdba0fd8063a81642d7d96fea052c8debe9acf7791df20.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral29
Sample
cb949ebe87c55c0ba6cf0525161e2e6670c1ae186ab83ce46047446e9753a926.exe
Resource
win7-20220901-en
Behavioral task
behavioral30
Sample
cb949ebe87c55c0ba6cf0525161e2e6670c1ae186ab83ce46047446e9753a926.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral31
Sample
cbc0718c3c45ed4311aec5f83572b7b92d364ab4d16bc43582e781843bdef099.exe
Resource
win7-20220812-en
Behavioral task
behavioral32
Sample
cbc0718c3c45ed4311aec5f83572b7b92d364ab4d16bc43582e781843bdef099.exe
Resource
win10v2004-20220812-en
General
-
Target
b91eb833de386ea3d73d2954f0dce9fe38e4bf96594620af6c0935b9ee0d7e81.exe
-
Size
730KB
-
MD5
fb22207876c27361a84dd83ebb73ad0b
-
SHA1
7c9ec0647cf3dafba2e4e2d7f559cae1e92bbf57
-
SHA256
b91eb833de386ea3d73d2954f0dce9fe38e4bf96594620af6c0935b9ee0d7e81
-
SHA512
c8301e0e47ee3c3155ed5047328538a1f6a5b9de8c01b63d10efb5bfef16d2aa9b70f69a6c1dd6255b87e7b42c50af3a8a9d671e06d4d567ac8c9e4af8f8d013
-
SSDEEP
12288:9sOol4XixHibVqWMl2Vm6d5cx4tpE3oDY1bDRwn87cLHQo4zLXBFG0r74YLtlh:9yniZqRud5ptpNiDyn4Z3XX7IOH
Malware Config
Signatures
-
Detect Blister loader x32 4 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\Helper.CC\Helper.CC.dll family_blister_x32 \Users\Admin\AppData\Local\Temp\Helper.CC\Helper.CC.dll family_blister_x32 \Users\Admin\AppData\Local\Temp\Helper.CC\Helper.CC.dll family_blister_x32 behavioral13/memory/1288-61-0x0000000017170000-0x000000001724D000-memory.dmp family_blister_x32 -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exepid process 1288 rundll32.exe 1288 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
b91eb833de386ea3d73d2954f0dce9fe38e4bf96594620af6c0935b9ee0d7e81.exeRundll32.exedescription pid process target process PID 1708 wrote to memory of 912 1708 b91eb833de386ea3d73d2954f0dce9fe38e4bf96594620af6c0935b9ee0d7e81.exe Rundll32.exe PID 1708 wrote to memory of 912 1708 b91eb833de386ea3d73d2954f0dce9fe38e4bf96594620af6c0935b9ee0d7e81.exe Rundll32.exe PID 1708 wrote to memory of 912 1708 b91eb833de386ea3d73d2954f0dce9fe38e4bf96594620af6c0935b9ee0d7e81.exe Rundll32.exe PID 912 wrote to memory of 1288 912 Rundll32.exe rundll32.exe PID 912 wrote to memory of 1288 912 Rundll32.exe rundll32.exe PID 912 wrote to memory of 1288 912 Rundll32.exe rundll32.exe PID 912 wrote to memory of 1288 912 Rundll32.exe rundll32.exe PID 912 wrote to memory of 1288 912 Rundll32.exe rundll32.exe PID 912 wrote to memory of 1288 912 Rundll32.exe rundll32.exe PID 912 wrote to memory of 1288 912 Rundll32.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b91eb833de386ea3d73d2954f0dce9fe38e4bf96594620af6c0935b9ee0d7e81.exe"C:\Users\Admin\AppData\Local\Temp\b91eb833de386ea3d73d2954f0dce9fe38e4bf96594620af6c0935b9ee0d7e81.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\system32\Rundll32.exeRundll32.exe C:\Users\Admin\AppData\Local\Temp\Helper.CC\Helper.CC.dll,LaunchColorCpl2⤵
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Windows\SysWOW64\rundll32.exeRundll32.exe C:\Users\Admin\AppData\Local\Temp\Helper.CC\Helper.CC.dll,LaunchColorCpl3⤵
- Loads dropped DLL
PID:1288
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
871KB
MD5672780f51dca49d1654c0373eeba74c4
SHA190bb4a455e7141af504a66917aa417fcd2b96d6b
SHA25644e5770751679f178f90ef7bd57e8e4ccfb6051767d8e906708c52184bf27f32
SHA512bbcd4e0f6c00a113927abd36431f513f569bf75c29b457325b1c0572fac0d1829a1c10bf1842d86ae59339673e1c3a4d2344fb0126dcd27c31f4458eaf8ae697
-
Filesize
871KB
MD5672780f51dca49d1654c0373eeba74c4
SHA190bb4a455e7141af504a66917aa417fcd2b96d6b
SHA25644e5770751679f178f90ef7bd57e8e4ccfb6051767d8e906708c52184bf27f32
SHA512bbcd4e0f6c00a113927abd36431f513f569bf75c29b457325b1c0572fac0d1829a1c10bf1842d86ae59339673e1c3a4d2344fb0126dcd27c31f4458eaf8ae697
-
Filesize
871KB
MD5672780f51dca49d1654c0373eeba74c4
SHA190bb4a455e7141af504a66917aa417fcd2b96d6b
SHA25644e5770751679f178f90ef7bd57e8e4ccfb6051767d8e906708c52184bf27f32
SHA512bbcd4e0f6c00a113927abd36431f513f569bf75c29b457325b1c0572fac0d1829a1c10bf1842d86ae59339673e1c3a4d2344fb0126dcd27c31f4458eaf8ae697