Overview
overview
10Static
static
a0cc60b4fa...0f.exe
windows7-x64
3a0cc60b4fa...0f.exe
windows10-2004-x64
3a69cf4fa61...7f.exe
windows7-x64
10a69cf4fa61...7f.exe
windows10-2004-x64
10a6dbbf3d86...75.exe
windows7-x64
7a6dbbf3d86...75.exe
windows10-2004-x64
7a783bb9edd...09.exe
windows7-x64
10a783bb9edd...09.exe
windows10-2004-x64
10ac89e5c3ba...5a.exe
windows7-x64
10ac89e5c3ba...5a.exe
windows10-2004-x64
10b6d4c3b56c...24.exe
windows7-x64
3b6d4c3b56c...24.exe
windows10-2004-x64
3b91eb833de...81.exe
windows7-x64
10b91eb833de...81.exe
windows10-2004-x64
10b959b003c1...74.exe
windows7-x64
10b959b003c1...74.exe
windows10-2004-x64
10ba8824a7c7...63.exe
windows7-x64
7ba8824a7c7...63.exe
windows10-2004-x64
7c0f1ebcca8...4a.exe
windows7-x64
10c0f1ebcca8...4a.exe
windows10-2004-x64
10c3117be60e...ea.exe
windows7-x64
10c3117be60e...ea.exe
windows10-2004-x64
10c492754e6c...ef.exe
windows7-x64
3c492754e6c...ef.exe
windows10-2004-x64
3c9cc4d95ca...cd.exe
windows7-x64
10c9cc4d95ca...cd.exe
windows10-2004-x64
10ca4a22ce76...20.exe
windows7-x64
10ca4a22ce76...20.exe
windows10-2004-x64
10cb949ebe87...26.exe
windows7-x64
10cb949ebe87...26.exe
windows10-2004-x64
10cbc0718c3c...99.exe
windows7-x64
10cbc0718c3c...99.exe
windows10-2004-x64
10Analysis
-
max time kernel
37s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05-09-2022 15:53
Static task
static1
Behavioral task
behavioral1
Sample
a0cc60b4fa8f29f5410424687c8f3e60b7f7b63c632fb506d2a42be45264de0f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a0cc60b4fa8f29f5410424687c8f3e60b7f7b63c632fb506d2a42be45264de0f.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
a69cf4fa61217f8230e032089a8f56f7ebf31e4cd35124e6ad104db86851f17f.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
a69cf4fa61217f8230e032089a8f56f7ebf31e4cd35124e6ad104db86851f17f.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
a6dbbf3d861bcc796d59c88856aa1537ad9929bb48026eade107b1ab504dbf75.exe
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
a6dbbf3d861bcc796d59c88856aa1537ad9929bb48026eade107b1ab504dbf75.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral7
Sample
a783bb9eddc40876a80504615a40e65649b910eeb0b5041ca7e8635d39b1d209.exe
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
a783bb9eddc40876a80504615a40e65649b910eeb0b5041ca7e8635d39b1d209.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
ac89e5c3ba69bb41f4bb4bb7f7af39514b5a211ec6b641d45408777b30c75c5a.exe
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
ac89e5c3ba69bb41f4bb4bb7f7af39514b5a211ec6b641d45408777b30c75c5a.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral11
Sample
b6d4c3b56c0b12a12ff0e2baee3f46f4683f9e33a780c9631b61cf755eebc024.exe
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
b6d4c3b56c0b12a12ff0e2baee3f46f4683f9e33a780c9631b61cf755eebc024.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
b91eb833de386ea3d73d2954f0dce9fe38e4bf96594620af6c0935b9ee0d7e81.exe
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
b91eb833de386ea3d73d2954f0dce9fe38e4bf96594620af6c0935b9ee0d7e81.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral15
Sample
b959b003c1e558ff0ccf1d0f96509b155d6f86eb20caa97b470f3422494d8d74.exe
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
b959b003c1e558ff0ccf1d0f96509b155d6f86eb20caa97b470f3422494d8d74.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral17
Sample
ba8824a7c7b7db0f89d566719b6a2c0893158b37b5ac45dd138acbdf6d7e9d63.exe
Resource
win7-20220901-en
Behavioral task
behavioral18
Sample
ba8824a7c7b7db0f89d566719b6a2c0893158b37b5ac45dd138acbdf6d7e9d63.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
c0f1ebcca8a8094853aa65210ddde80f6a9ffe7b3f2d75d5652b166722b3aa4a.exe
Resource
win7-20220812-en
Behavioral task
behavioral20
Sample
c0f1ebcca8a8094853aa65210ddde80f6a9ffe7b3f2d75d5652b166722b3aa4a.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral21
Sample
c3117be60ef780dc86581052b5e3f72969bef6471c7218e35beec60d167eb4ea.exe
Resource
win7-20220812-en
Behavioral task
behavioral22
Sample
c3117be60ef780dc86581052b5e3f72969bef6471c7218e35beec60d167eb4ea.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral23
Sample
c492754e6c21e22732ad1188c511745a3eea064696dc7f351d66e3c92bd63cef.exe
Resource
win7-20220901-en
Behavioral task
behavioral24
Sample
c492754e6c21e22732ad1188c511745a3eea064696dc7f351d66e3c92bd63cef.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral25
Sample
c9cc4d95ca1197328a743a41b09c2375d54ac97fcdde5e07bda660396710eccd.exe
Resource
win7-20220812-en
Behavioral task
behavioral26
Sample
c9cc4d95ca1197328a743a41b09c2375d54ac97fcdde5e07bda660396710eccd.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral27
Sample
ca4a22ce761737a04ebdba0fd8063a81642d7d96fea052c8debe9acf7791df20.exe
Resource
win7-20220901-en
Behavioral task
behavioral28
Sample
ca4a22ce761737a04ebdba0fd8063a81642d7d96fea052c8debe9acf7791df20.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral29
Sample
cb949ebe87c55c0ba6cf0525161e2e6670c1ae186ab83ce46047446e9753a926.exe
Resource
win7-20220901-en
Behavioral task
behavioral30
Sample
cb949ebe87c55c0ba6cf0525161e2e6670c1ae186ab83ce46047446e9753a926.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral31
Sample
cbc0718c3c45ed4311aec5f83572b7b92d364ab4d16bc43582e781843bdef099.exe
Resource
win7-20220812-en
Behavioral task
behavioral32
Sample
cbc0718c3c45ed4311aec5f83572b7b92d364ab4d16bc43582e781843bdef099.exe
Resource
win10v2004-20220812-en
General
-
Target
c0f1ebcca8a8094853aa65210ddde80f6a9ffe7b3f2d75d5652b166722b3aa4a.exe
-
Size
695KB
-
MD5
1fc7bfc48c95c47e06b59d795b6df6ca
-
SHA1
2f2b5234734ecdc341572ab0cd0aa2c7df30a6da
-
SHA256
c0f1ebcca8a8094853aa65210ddde80f6a9ffe7b3f2d75d5652b166722b3aa4a
-
SHA512
9c70a20d66f74c4bb1c6837027b3bd3809bca7404c0d8899c90169f3da45e6a5265a9e0b4b11001a83f641f8118fd8412f64e7859cf281db813802b08e9c6ee3
-
SSDEEP
12288:9sOol4XixHXc8cR8oxB5cD4w4k+WE97am7hA1RE1TcZVM7giqV2Ez38/CFtJlH/:9ynXHc9753w4ktSBA61ToM7giqhA/cH/
Malware Config
Signatures
-
Detect Blister loader x32 4 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\Helper.CC\Helper.CC.dll family_blister_x32 \Users\Admin\AppData\Local\Temp\Helper.CC\Helper.CC.dll family_blister_x32 \Users\Admin\AppData\Local\Temp\Helper.CC\Helper.CC.dll family_blister_x32 behavioral19/memory/1936-61-0x0000000017170000-0x0000000017244000-memory.dmp family_blister_x32 -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exepid process 1936 rundll32.exe 1936 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
c0f1ebcca8a8094853aa65210ddde80f6a9ffe7b3f2d75d5652b166722b3aa4a.exeRundll32.exedescription pid process target process PID 1552 wrote to memory of 1788 1552 c0f1ebcca8a8094853aa65210ddde80f6a9ffe7b3f2d75d5652b166722b3aa4a.exe Rundll32.exe PID 1552 wrote to memory of 1788 1552 c0f1ebcca8a8094853aa65210ddde80f6a9ffe7b3f2d75d5652b166722b3aa4a.exe Rundll32.exe PID 1552 wrote to memory of 1788 1552 c0f1ebcca8a8094853aa65210ddde80f6a9ffe7b3f2d75d5652b166722b3aa4a.exe Rundll32.exe PID 1788 wrote to memory of 1936 1788 Rundll32.exe rundll32.exe PID 1788 wrote to memory of 1936 1788 Rundll32.exe rundll32.exe PID 1788 wrote to memory of 1936 1788 Rundll32.exe rundll32.exe PID 1788 wrote to memory of 1936 1788 Rundll32.exe rundll32.exe PID 1788 wrote to memory of 1936 1788 Rundll32.exe rundll32.exe PID 1788 wrote to memory of 1936 1788 Rundll32.exe rundll32.exe PID 1788 wrote to memory of 1936 1788 Rundll32.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0f1ebcca8a8094853aa65210ddde80f6a9ffe7b3f2d75d5652b166722b3aa4a.exe"C:\Users\Admin\AppData\Local\Temp\c0f1ebcca8a8094853aa65210ddde80f6a9ffe7b3f2d75d5652b166722b3aa4a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\system32\Rundll32.exeRundll32.exe C:\Users\Admin\AppData\Local\Temp\Helper.CC\Helper.CC.dll,LaunchColorCpl2⤵
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\rundll32.exeRundll32.exe C:\Users\Admin\AppData\Local\Temp\Helper.CC\Helper.CC.dll,LaunchColorCpl3⤵
- Loads dropped DLL
PID:1936
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
836KB
MD5c7428d3dcbefd49f0f060d6771f17a5b
SHA1b21b0b2cc73331d61e984a0ad28dbe5588cba361
SHA256a34821b50aadee0dd85c382c43f44dae1e5fef0febf2f7aed6abf3f3e21f7994
SHA512a011d0f52774525ff97420ecd1f13147a7e73040ee8f571025b57f6168521752e657f2f72496a2ee781a50905677cccfe4316232570367dec1b63c5feaa16c59
-
Filesize
836KB
MD5c7428d3dcbefd49f0f060d6771f17a5b
SHA1b21b0b2cc73331d61e984a0ad28dbe5588cba361
SHA256a34821b50aadee0dd85c382c43f44dae1e5fef0febf2f7aed6abf3f3e21f7994
SHA512a011d0f52774525ff97420ecd1f13147a7e73040ee8f571025b57f6168521752e657f2f72496a2ee781a50905677cccfe4316232570367dec1b63c5feaa16c59
-
Filesize
836KB
MD5c7428d3dcbefd49f0f060d6771f17a5b
SHA1b21b0b2cc73331d61e984a0ad28dbe5588cba361
SHA256a34821b50aadee0dd85c382c43f44dae1e5fef0febf2f7aed6abf3f3e21f7994
SHA512a011d0f52774525ff97420ecd1f13147a7e73040ee8f571025b57f6168521752e657f2f72496a2ee781a50905677cccfe4316232570367dec1b63c5feaa16c59