Overview
overview
10Static
static
a0cc60b4fa...0f.exe
windows7-x64
3a0cc60b4fa...0f.exe
windows10-2004-x64
3a69cf4fa61...7f.exe
windows7-x64
10a69cf4fa61...7f.exe
windows10-2004-x64
10a6dbbf3d86...75.exe
windows7-x64
7a6dbbf3d86...75.exe
windows10-2004-x64
7a783bb9edd...09.exe
windows7-x64
10a783bb9edd...09.exe
windows10-2004-x64
10ac89e5c3ba...5a.exe
windows7-x64
10ac89e5c3ba...5a.exe
windows10-2004-x64
10b6d4c3b56c...24.exe
windows7-x64
3b6d4c3b56c...24.exe
windows10-2004-x64
3b91eb833de...81.exe
windows7-x64
10b91eb833de...81.exe
windows10-2004-x64
10b959b003c1...74.exe
windows7-x64
10b959b003c1...74.exe
windows10-2004-x64
10ba8824a7c7...63.exe
windows7-x64
7ba8824a7c7...63.exe
windows10-2004-x64
7c0f1ebcca8...4a.exe
windows7-x64
10c0f1ebcca8...4a.exe
windows10-2004-x64
10c3117be60e...ea.exe
windows7-x64
10c3117be60e...ea.exe
windows10-2004-x64
10c492754e6c...ef.exe
windows7-x64
3c492754e6c...ef.exe
windows10-2004-x64
3c9cc4d95ca...cd.exe
windows7-x64
10c9cc4d95ca...cd.exe
windows10-2004-x64
10ca4a22ce76...20.exe
windows7-x64
10ca4a22ce76...20.exe
windows10-2004-x64
10cb949ebe87...26.exe
windows7-x64
10cb949ebe87...26.exe
windows10-2004-x64
10cbc0718c3c...99.exe
windows7-x64
10cbc0718c3c...99.exe
windows10-2004-x64
10Analysis
-
max time kernel
37s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05-09-2022 15:53
Static task
static1
Behavioral task
behavioral1
Sample
a0cc60b4fa8f29f5410424687c8f3e60b7f7b63c632fb506d2a42be45264de0f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a0cc60b4fa8f29f5410424687c8f3e60b7f7b63c632fb506d2a42be45264de0f.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
a69cf4fa61217f8230e032089a8f56f7ebf31e4cd35124e6ad104db86851f17f.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
a69cf4fa61217f8230e032089a8f56f7ebf31e4cd35124e6ad104db86851f17f.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
a6dbbf3d861bcc796d59c88856aa1537ad9929bb48026eade107b1ab504dbf75.exe
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
a6dbbf3d861bcc796d59c88856aa1537ad9929bb48026eade107b1ab504dbf75.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral7
Sample
a783bb9eddc40876a80504615a40e65649b910eeb0b5041ca7e8635d39b1d209.exe
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
a783bb9eddc40876a80504615a40e65649b910eeb0b5041ca7e8635d39b1d209.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
ac89e5c3ba69bb41f4bb4bb7f7af39514b5a211ec6b641d45408777b30c75c5a.exe
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
ac89e5c3ba69bb41f4bb4bb7f7af39514b5a211ec6b641d45408777b30c75c5a.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral11
Sample
b6d4c3b56c0b12a12ff0e2baee3f46f4683f9e33a780c9631b61cf755eebc024.exe
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
b6d4c3b56c0b12a12ff0e2baee3f46f4683f9e33a780c9631b61cf755eebc024.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
b91eb833de386ea3d73d2954f0dce9fe38e4bf96594620af6c0935b9ee0d7e81.exe
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
b91eb833de386ea3d73d2954f0dce9fe38e4bf96594620af6c0935b9ee0d7e81.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral15
Sample
b959b003c1e558ff0ccf1d0f96509b155d6f86eb20caa97b470f3422494d8d74.exe
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
b959b003c1e558ff0ccf1d0f96509b155d6f86eb20caa97b470f3422494d8d74.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral17
Sample
ba8824a7c7b7db0f89d566719b6a2c0893158b37b5ac45dd138acbdf6d7e9d63.exe
Resource
win7-20220901-en
Behavioral task
behavioral18
Sample
ba8824a7c7b7db0f89d566719b6a2c0893158b37b5ac45dd138acbdf6d7e9d63.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
c0f1ebcca8a8094853aa65210ddde80f6a9ffe7b3f2d75d5652b166722b3aa4a.exe
Resource
win7-20220812-en
Behavioral task
behavioral20
Sample
c0f1ebcca8a8094853aa65210ddde80f6a9ffe7b3f2d75d5652b166722b3aa4a.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral21
Sample
c3117be60ef780dc86581052b5e3f72969bef6471c7218e35beec60d167eb4ea.exe
Resource
win7-20220812-en
Behavioral task
behavioral22
Sample
c3117be60ef780dc86581052b5e3f72969bef6471c7218e35beec60d167eb4ea.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral23
Sample
c492754e6c21e22732ad1188c511745a3eea064696dc7f351d66e3c92bd63cef.exe
Resource
win7-20220901-en
Behavioral task
behavioral24
Sample
c492754e6c21e22732ad1188c511745a3eea064696dc7f351d66e3c92bd63cef.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral25
Sample
c9cc4d95ca1197328a743a41b09c2375d54ac97fcdde5e07bda660396710eccd.exe
Resource
win7-20220812-en
Behavioral task
behavioral26
Sample
c9cc4d95ca1197328a743a41b09c2375d54ac97fcdde5e07bda660396710eccd.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral27
Sample
ca4a22ce761737a04ebdba0fd8063a81642d7d96fea052c8debe9acf7791df20.exe
Resource
win7-20220901-en
Behavioral task
behavioral28
Sample
ca4a22ce761737a04ebdba0fd8063a81642d7d96fea052c8debe9acf7791df20.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral29
Sample
cb949ebe87c55c0ba6cf0525161e2e6670c1ae186ab83ce46047446e9753a926.exe
Resource
win7-20220901-en
Behavioral task
behavioral30
Sample
cb949ebe87c55c0ba6cf0525161e2e6670c1ae186ab83ce46047446e9753a926.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral31
Sample
cbc0718c3c45ed4311aec5f83572b7b92d364ab4d16bc43582e781843bdef099.exe
Resource
win7-20220812-en
Behavioral task
behavioral32
Sample
cbc0718c3c45ed4311aec5f83572b7b92d364ab4d16bc43582e781843bdef099.exe
Resource
win10v2004-20220812-en
General
-
Target
c9cc4d95ca1197328a743a41b09c2375d54ac97fcdde5e07bda660396710eccd.exe
-
Size
3.4MB
-
MD5
61a5cbc68cc4f44373f088b68dc77551
-
SHA1
a5901558d19fac101d8c11bb7a0a07cb2dd26bb5
-
SHA256
c9cc4d95ca1197328a743a41b09c2375d54ac97fcdde5e07bda660396710eccd
-
SHA512
e592e28a6e901030f1d3cba59a6ebe8dc1e6df51c3d3ca7e0344f627dd40e62f99ecf90270ce302962da128942a9aaf952483a52eb7b73b51f28f541bd46b6fc
-
SSDEEP
98304:UWhQkBPK3tMxUYUZKM7ASJPoJQ8eTY3Tn/jkrmT0:UiQSNOzKM7ASJPX8eTwjkrV
Malware Config
Signatures
-
Detect Blister loader x32 8 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\Dataperformance\FramworkGUI.dll family_blister_x32 \Users\Admin\AppData\Local\Temp\Dataperformance\FramworkGUI.dll family_blister_x32 \Users\Admin\AppData\Local\Temp\Dataperformance\FramworkGUI.dll family_blister_x32 C:\Users\Admin\AppData\Local\Temp\Dataperformance\Storage.dll family_blister_x32 \Users\Admin\AppData\Local\Temp\Dataperformance\Storage.dll family_blister_x32 \Users\Admin\AppData\Local\Temp\Dataperformance\Storage.dll family_blister_x32 behavioral25/memory/1144-67-0x0000000017170000-0x0000000017489000-memory.dmp family_blister_x32 behavioral25/memory/1724-68-0x0000000017170000-0x0000000017222000-memory.dmp family_blister_x32 -
Loads dropped DLL 4 IoCs
Processes:
rundll32.exerundll32.exepid process 1144 rundll32.exe 1144 rundll32.exe 1724 rundll32.exe 1724 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
c9cc4d95ca1197328a743a41b09c2375d54ac97fcdde5e07bda660396710eccd.exeRundll32.exeRundll32.exedescription pid process target process PID 1384 wrote to memory of 996 1384 c9cc4d95ca1197328a743a41b09c2375d54ac97fcdde5e07bda660396710eccd.exe Rundll32.exe PID 1384 wrote to memory of 996 1384 c9cc4d95ca1197328a743a41b09c2375d54ac97fcdde5e07bda660396710eccd.exe Rundll32.exe PID 1384 wrote to memory of 996 1384 c9cc4d95ca1197328a743a41b09c2375d54ac97fcdde5e07bda660396710eccd.exe Rundll32.exe PID 996 wrote to memory of 1144 996 Rundll32.exe rundll32.exe PID 996 wrote to memory of 1144 996 Rundll32.exe rundll32.exe PID 996 wrote to memory of 1144 996 Rundll32.exe rundll32.exe PID 996 wrote to memory of 1144 996 Rundll32.exe rundll32.exe PID 996 wrote to memory of 1144 996 Rundll32.exe rundll32.exe PID 996 wrote to memory of 1144 996 Rundll32.exe rundll32.exe PID 996 wrote to memory of 1144 996 Rundll32.exe rundll32.exe PID 1384 wrote to memory of 2028 1384 c9cc4d95ca1197328a743a41b09c2375d54ac97fcdde5e07bda660396710eccd.exe Rundll32.exe PID 1384 wrote to memory of 2028 1384 c9cc4d95ca1197328a743a41b09c2375d54ac97fcdde5e07bda660396710eccd.exe Rundll32.exe PID 1384 wrote to memory of 2028 1384 c9cc4d95ca1197328a743a41b09c2375d54ac97fcdde5e07bda660396710eccd.exe Rundll32.exe PID 2028 wrote to memory of 1724 2028 Rundll32.exe rundll32.exe PID 2028 wrote to memory of 1724 2028 Rundll32.exe rundll32.exe PID 2028 wrote to memory of 1724 2028 Rundll32.exe rundll32.exe PID 2028 wrote to memory of 1724 2028 Rundll32.exe rundll32.exe PID 2028 wrote to memory of 1724 2028 Rundll32.exe rundll32.exe PID 2028 wrote to memory of 1724 2028 Rundll32.exe rundll32.exe PID 2028 wrote to memory of 1724 2028 Rundll32.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c9cc4d95ca1197328a743a41b09c2375d54ac97fcdde5e07bda660396710eccd.exe"C:\Users\Admin\AppData\Local\Temp\c9cc4d95ca1197328a743a41b09c2375d54ac97fcdde5e07bda660396710eccd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\system32\Rundll32.exeRundll32.exe C:\Users\Admin\AppData\Local\Temp\Dataperformance\FramworkGUI.dll,LaunchColorCpl2⤵
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Windows\SysWOW64\rundll32.exeRundll32.exe C:\Users\Admin\AppData\Local\Temp\Dataperformance\FramworkGUI.dll,LaunchColorCpl3⤵
- Loads dropped DLL
PID:1144
-
-
-
C:\Windows\system32\Rundll32.exeRundll32.exe C:\Users\Admin\AppData\Local\Temp\Dataperformance\Storage.dll,LaunchColorCpl2⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\rundll32.exeRundll32.exe C:\Users\Admin\AppData\Local\Temp\Dataperformance\Storage.dll,LaunchColorCpl3⤵
- Loads dropped DLL
PID:1724
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD53a9cbd39d977b2b95ee9ee3184953762
SHA1eed69851b97ecfe6edf9a66439d76adbfc270d3d
SHA256e7368bc19f746a8eff5a208f1b8ae5b0fe15bf5e9b9c93db3e8be42f87887f30
SHA5120b2e144141e730351c888b0752e6f9c00a5e77328c027c2ddc25d04d2a866139008550775772a4ff0d1cffcacbd9bfefad9d66c62703302187164c3bc3efc516
-
Filesize
707KB
MD5007236733e6ea31367c9aa59076d2996
SHA13bebd05627fbae2cc4756d07aed2070744981746
SHA25686b32bcc02284d44a1a124c938257c2e33c04d800ea71991e954b5c661630308
SHA512abb2582e0237e29850c54ab02c47b853f1cc5142804f50aae77a40dc0e3eebf1cb13b0f81cabc8eb6e54193f659c08cb6c072ba91888b4998fe1998a154a6362
-
Filesize
3.1MB
MD53a9cbd39d977b2b95ee9ee3184953762
SHA1eed69851b97ecfe6edf9a66439d76adbfc270d3d
SHA256e7368bc19f746a8eff5a208f1b8ae5b0fe15bf5e9b9c93db3e8be42f87887f30
SHA5120b2e144141e730351c888b0752e6f9c00a5e77328c027c2ddc25d04d2a866139008550775772a4ff0d1cffcacbd9bfefad9d66c62703302187164c3bc3efc516
-
Filesize
3.1MB
MD53a9cbd39d977b2b95ee9ee3184953762
SHA1eed69851b97ecfe6edf9a66439d76adbfc270d3d
SHA256e7368bc19f746a8eff5a208f1b8ae5b0fe15bf5e9b9c93db3e8be42f87887f30
SHA5120b2e144141e730351c888b0752e6f9c00a5e77328c027c2ddc25d04d2a866139008550775772a4ff0d1cffcacbd9bfefad9d66c62703302187164c3bc3efc516
-
Filesize
707KB
MD5007236733e6ea31367c9aa59076d2996
SHA13bebd05627fbae2cc4756d07aed2070744981746
SHA25686b32bcc02284d44a1a124c938257c2e33c04d800ea71991e954b5c661630308
SHA512abb2582e0237e29850c54ab02c47b853f1cc5142804f50aae77a40dc0e3eebf1cb13b0f81cabc8eb6e54193f659c08cb6c072ba91888b4998fe1998a154a6362
-
Filesize
707KB
MD5007236733e6ea31367c9aa59076d2996
SHA13bebd05627fbae2cc4756d07aed2070744981746
SHA25686b32bcc02284d44a1a124c938257c2e33c04d800ea71991e954b5c661630308
SHA512abb2582e0237e29850c54ab02c47b853f1cc5142804f50aae77a40dc0e3eebf1cb13b0f81cabc8eb6e54193f659c08cb6c072ba91888b4998fe1998a154a6362