Analysis

  • max time kernel
    39s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05-09-2022 15:53

General

  • Target

    c3117be60ef780dc86581052b5e3f72969bef6471c7218e35beec60d167eb4ea.exe

  • Size

    1.3MB

  • MD5

    dba747247bb951822f83787ecee99cef

  • SHA1

    263594a9735632dbbae539dff8bd413a92bfdf22

  • SHA256

    c3117be60ef780dc86581052b5e3f72969bef6471c7218e35beec60d167eb4ea

  • SHA512

    c51d91765c8de25572cfbb234c706ac9c47885453ee05ecf3eece236bec5d93505e3893beb4bbfeed9dc98dc970c8863d352c01991092d23a0746b0e5817628e

  • SSDEEP

    24576:cy8QxF2jYjw5eT9eD++nO18IUyLdqkFqGp8COdutaiGLpRmi+qGUPg:cwg4l9eD/OzbdFGlqGLdg

Score
10/10

Malware Config

Signatures

  • BLISTER

    BLISTER is a downloader used to deliver other malware families.

  • Detect Blister loader x32 4 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c3117be60ef780dc86581052b5e3f72969bef6471c7218e35beec60d167eb4ea.exe
    "C:\Users\Admin\AppData\Local\Temp\c3117be60ef780dc86581052b5e3f72969bef6471c7218e35beec60d167eb4ea.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1440
    • C:\Windows\system32\Rundll32.exe
      Rundll32.exe C:\Users\Admin\AppData\Local\Temp\Colorgaming\holorui.dll,LaunchColorCpl
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2020
      • C:\Windows\SysWOW64\rundll32.exe
        Rundll32.exe C:\Users\Admin\AppData\Local\Temp\Colorgaming\holorui.dll,LaunchColorCpl
        3⤵
        • Loads dropped DLL
        PID:1976

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Colorgaming\holorui.dll

    Filesize

    1.1MB

    MD5

    2d2bf57a4e0359b19ca31cc52449c622

    SHA1

    3d99d8fecbabc16f732999eef599c04380f65c87

    SHA256

    6c6f808f9b19e1fab1c1b83dc99386f0ceee8593ddfd461ac047eae812df8733

    SHA512

    79e6444c2118aa9f934d6b3db0c4ff6abf7c232ea625b21a280bb01cb738b316cc255d97839ac1348d7ea87556104507755c05896179f1f551a80d5222cf876c

  • \Users\Admin\AppData\Local\Temp\Colorgaming\holorui.dll

    Filesize

    1.1MB

    MD5

    2d2bf57a4e0359b19ca31cc52449c622

    SHA1

    3d99d8fecbabc16f732999eef599c04380f65c87

    SHA256

    6c6f808f9b19e1fab1c1b83dc99386f0ceee8593ddfd461ac047eae812df8733

    SHA512

    79e6444c2118aa9f934d6b3db0c4ff6abf7c232ea625b21a280bb01cb738b316cc255d97839ac1348d7ea87556104507755c05896179f1f551a80d5222cf876c

  • \Users\Admin\AppData\Local\Temp\Colorgaming\holorui.dll

    Filesize

    1.1MB

    MD5

    2d2bf57a4e0359b19ca31cc52449c622

    SHA1

    3d99d8fecbabc16f732999eef599c04380f65c87

    SHA256

    6c6f808f9b19e1fab1c1b83dc99386f0ceee8593ddfd461ac047eae812df8733

    SHA512

    79e6444c2118aa9f934d6b3db0c4ff6abf7c232ea625b21a280bb01cb738b316cc255d97839ac1348d7ea87556104507755c05896179f1f551a80d5222cf876c

  • memory/1440-54-0x000007FEFC621000-0x000007FEFC623000-memory.dmp

    Filesize

    8KB

  • memory/1976-58-0x0000000076181000-0x0000000076183000-memory.dmp

    Filesize

    8KB

  • memory/1976-61-0x0000000017170000-0x0000000017282000-memory.dmp

    Filesize

    1.1MB