Overview
overview
10Static
static
a0cc60b4fa...0f.exe
windows7-x64
3a0cc60b4fa...0f.exe
windows10-2004-x64
3a69cf4fa61...7f.exe
windows7-x64
10a69cf4fa61...7f.exe
windows10-2004-x64
10a6dbbf3d86...75.exe
windows7-x64
7a6dbbf3d86...75.exe
windows10-2004-x64
7a783bb9edd...09.exe
windows7-x64
10a783bb9edd...09.exe
windows10-2004-x64
10ac89e5c3ba...5a.exe
windows7-x64
10ac89e5c3ba...5a.exe
windows10-2004-x64
10b6d4c3b56c...24.exe
windows7-x64
3b6d4c3b56c...24.exe
windows10-2004-x64
3b91eb833de...81.exe
windows7-x64
10b91eb833de...81.exe
windows10-2004-x64
10b959b003c1...74.exe
windows7-x64
10b959b003c1...74.exe
windows10-2004-x64
10ba8824a7c7...63.exe
windows7-x64
7ba8824a7c7...63.exe
windows10-2004-x64
7c0f1ebcca8...4a.exe
windows7-x64
10c0f1ebcca8...4a.exe
windows10-2004-x64
10c3117be60e...ea.exe
windows7-x64
10c3117be60e...ea.exe
windows10-2004-x64
10c492754e6c...ef.exe
windows7-x64
3c492754e6c...ef.exe
windows10-2004-x64
3c9cc4d95ca...cd.exe
windows7-x64
10c9cc4d95ca...cd.exe
windows10-2004-x64
10ca4a22ce76...20.exe
windows7-x64
10ca4a22ce76...20.exe
windows10-2004-x64
10cb949ebe87...26.exe
windows7-x64
10cb949ebe87...26.exe
windows10-2004-x64
10cbc0718c3c...99.exe
windows7-x64
10cbc0718c3c...99.exe
windows10-2004-x64
10Analysis
-
max time kernel
36s -
max time network
55s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
05-09-2022 15:53
Static task
static1
Behavioral task
behavioral1
Sample
a0cc60b4fa8f29f5410424687c8f3e60b7f7b63c632fb506d2a42be45264de0f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a0cc60b4fa8f29f5410424687c8f3e60b7f7b63c632fb506d2a42be45264de0f.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
a69cf4fa61217f8230e032089a8f56f7ebf31e4cd35124e6ad104db86851f17f.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
a69cf4fa61217f8230e032089a8f56f7ebf31e4cd35124e6ad104db86851f17f.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
a6dbbf3d861bcc796d59c88856aa1537ad9929bb48026eade107b1ab504dbf75.exe
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
a6dbbf3d861bcc796d59c88856aa1537ad9929bb48026eade107b1ab504dbf75.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral7
Sample
a783bb9eddc40876a80504615a40e65649b910eeb0b5041ca7e8635d39b1d209.exe
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
a783bb9eddc40876a80504615a40e65649b910eeb0b5041ca7e8635d39b1d209.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
ac89e5c3ba69bb41f4bb4bb7f7af39514b5a211ec6b641d45408777b30c75c5a.exe
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
ac89e5c3ba69bb41f4bb4bb7f7af39514b5a211ec6b641d45408777b30c75c5a.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral11
Sample
b6d4c3b56c0b12a12ff0e2baee3f46f4683f9e33a780c9631b61cf755eebc024.exe
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
b6d4c3b56c0b12a12ff0e2baee3f46f4683f9e33a780c9631b61cf755eebc024.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
b91eb833de386ea3d73d2954f0dce9fe38e4bf96594620af6c0935b9ee0d7e81.exe
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
b91eb833de386ea3d73d2954f0dce9fe38e4bf96594620af6c0935b9ee0d7e81.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral15
Sample
b959b003c1e558ff0ccf1d0f96509b155d6f86eb20caa97b470f3422494d8d74.exe
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
b959b003c1e558ff0ccf1d0f96509b155d6f86eb20caa97b470f3422494d8d74.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral17
Sample
ba8824a7c7b7db0f89d566719b6a2c0893158b37b5ac45dd138acbdf6d7e9d63.exe
Resource
win7-20220901-en
Behavioral task
behavioral18
Sample
ba8824a7c7b7db0f89d566719b6a2c0893158b37b5ac45dd138acbdf6d7e9d63.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
c0f1ebcca8a8094853aa65210ddde80f6a9ffe7b3f2d75d5652b166722b3aa4a.exe
Resource
win7-20220812-en
Behavioral task
behavioral20
Sample
c0f1ebcca8a8094853aa65210ddde80f6a9ffe7b3f2d75d5652b166722b3aa4a.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral21
Sample
c3117be60ef780dc86581052b5e3f72969bef6471c7218e35beec60d167eb4ea.exe
Resource
win7-20220812-en
Behavioral task
behavioral22
Sample
c3117be60ef780dc86581052b5e3f72969bef6471c7218e35beec60d167eb4ea.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral23
Sample
c492754e6c21e22732ad1188c511745a3eea064696dc7f351d66e3c92bd63cef.exe
Resource
win7-20220901-en
Behavioral task
behavioral24
Sample
c492754e6c21e22732ad1188c511745a3eea064696dc7f351d66e3c92bd63cef.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral25
Sample
c9cc4d95ca1197328a743a41b09c2375d54ac97fcdde5e07bda660396710eccd.exe
Resource
win7-20220812-en
Behavioral task
behavioral26
Sample
c9cc4d95ca1197328a743a41b09c2375d54ac97fcdde5e07bda660396710eccd.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral27
Sample
ca4a22ce761737a04ebdba0fd8063a81642d7d96fea052c8debe9acf7791df20.exe
Resource
win7-20220901-en
Behavioral task
behavioral28
Sample
ca4a22ce761737a04ebdba0fd8063a81642d7d96fea052c8debe9acf7791df20.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral29
Sample
cb949ebe87c55c0ba6cf0525161e2e6670c1ae186ab83ce46047446e9753a926.exe
Resource
win7-20220901-en
Behavioral task
behavioral30
Sample
cb949ebe87c55c0ba6cf0525161e2e6670c1ae186ab83ce46047446e9753a926.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral31
Sample
cbc0718c3c45ed4311aec5f83572b7b92d364ab4d16bc43582e781843bdef099.exe
Resource
win7-20220812-en
Behavioral task
behavioral32
Sample
cbc0718c3c45ed4311aec5f83572b7b92d364ab4d16bc43582e781843bdef099.exe
Resource
win10v2004-20220812-en
General
-
Target
ca4a22ce761737a04ebdba0fd8063a81642d7d96fea052c8debe9acf7791df20.exe
-
Size
3.4MB
-
MD5
dc21a8a77238419f38f09d31ed3440b7
-
SHA1
2a8f8431db1f03ede2c9b87eb4454b89cb0e9060
-
SHA256
ca4a22ce761737a04ebdba0fd8063a81642d7d96fea052c8debe9acf7791df20
-
SHA512
fddf7347f150c1908b252255dbc1a8dd254446747c4eaf7fd88eee3dc2cfdd35054d626b4e4bd7b9f74e2ff7c13d0079f4df04b5c7a8a30d712166fedfca1d7d
-
SSDEEP
49152:NXIK9iC4wSi+OXS6mOdOsVzPa4DnkcEr3JuRU+TAyPM5Bqe2t4dpPS3AOcD65:CK9d4wb9MO1RPa44cElYThPMs8PSiG
Malware Config
Signatures
-
Detect Blister loader x32 8 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\dirtempdata\api.dll family_blister_x32 \Users\Admin\AppData\Local\Temp\dirtempdata\api.dll family_blister_x32 \Users\Admin\AppData\Local\Temp\dirtempdata\api.dll family_blister_x32 C:\Users\Admin\AppData\Local\Temp\dirtempdata\diagnostic.dll family_blister_x32 \Users\Admin\AppData\Local\Temp\dirtempdata\diagnostic.dll family_blister_x32 \Users\Admin\AppData\Local\Temp\dirtempdata\diagnostic.dll family_blister_x32 behavioral27/memory/1392-67-0x0000000017170000-0x0000000017483000-memory.dmp family_blister_x32 behavioral27/memory/828-68-0x0000000017170000-0x0000000017227000-memory.dmp family_blister_x32 -
Loads dropped DLL 4 IoCs
Processes:
rundll32.exerundll32.exepid process 1392 rundll32.exe 1392 rundll32.exe 828 rundll32.exe 828 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
ca4a22ce761737a04ebdba0fd8063a81642d7d96fea052c8debe9acf7791df20.exeRundll32.exeRundll32.exedescription pid process target process PID 1532 wrote to memory of 1516 1532 ca4a22ce761737a04ebdba0fd8063a81642d7d96fea052c8debe9acf7791df20.exe Rundll32.exe PID 1532 wrote to memory of 1516 1532 ca4a22ce761737a04ebdba0fd8063a81642d7d96fea052c8debe9acf7791df20.exe Rundll32.exe PID 1532 wrote to memory of 1516 1532 ca4a22ce761737a04ebdba0fd8063a81642d7d96fea052c8debe9acf7791df20.exe Rundll32.exe PID 1516 wrote to memory of 1392 1516 Rundll32.exe rundll32.exe PID 1516 wrote to memory of 1392 1516 Rundll32.exe rundll32.exe PID 1516 wrote to memory of 1392 1516 Rundll32.exe rundll32.exe PID 1516 wrote to memory of 1392 1516 Rundll32.exe rundll32.exe PID 1516 wrote to memory of 1392 1516 Rundll32.exe rundll32.exe PID 1516 wrote to memory of 1392 1516 Rundll32.exe rundll32.exe PID 1516 wrote to memory of 1392 1516 Rundll32.exe rundll32.exe PID 1532 wrote to memory of 468 1532 ca4a22ce761737a04ebdba0fd8063a81642d7d96fea052c8debe9acf7791df20.exe Rundll32.exe PID 1532 wrote to memory of 468 1532 ca4a22ce761737a04ebdba0fd8063a81642d7d96fea052c8debe9acf7791df20.exe Rundll32.exe PID 1532 wrote to memory of 468 1532 ca4a22ce761737a04ebdba0fd8063a81642d7d96fea052c8debe9acf7791df20.exe Rundll32.exe PID 468 wrote to memory of 828 468 Rundll32.exe rundll32.exe PID 468 wrote to memory of 828 468 Rundll32.exe rundll32.exe PID 468 wrote to memory of 828 468 Rundll32.exe rundll32.exe PID 468 wrote to memory of 828 468 Rundll32.exe rundll32.exe PID 468 wrote to memory of 828 468 Rundll32.exe rundll32.exe PID 468 wrote to memory of 828 468 Rundll32.exe rundll32.exe PID 468 wrote to memory of 828 468 Rundll32.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca4a22ce761737a04ebdba0fd8063a81642d7d96fea052c8debe9acf7791df20.exe"C:\Users\Admin\AppData\Local\Temp\ca4a22ce761737a04ebdba0fd8063a81642d7d96fea052c8debe9acf7791df20.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\system32\Rundll32.exeRundll32.exe C:\Users\Admin\AppData\Local\Temp\dirtempdata\api.dll,LaunchColorCpl2⤵
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\rundll32.exeRundll32.exe C:\Users\Admin\AppData\Local\Temp\dirtempdata\api.dll,LaunchColorCpl3⤵
- Loads dropped DLL
PID:1392
-
-
-
C:\Windows\system32\Rundll32.exeRundll32.exe C:\Users\Admin\AppData\Local\Temp\dirtempdata\diagnostic.dll,LaunchColorCpl2⤵
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\SysWOW64\rundll32.exeRundll32.exe C:\Users\Admin\AppData\Local\Temp\dirtempdata\diagnostic.dll,LaunchColorCpl3⤵
- Loads dropped DLL
PID:828
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5cd0eda8961ff27f4b34611bab9a4c301
SHA13894f34ccc797c24d4acae71ac95545db0e6aebb
SHA256fa885e9ea1293552cb45a89e740426fa9c313225ff77ad1980dfea83b6c4a91c
SHA512c32437fdbae6001659864f17f3694b92184059ab35ffceed77eb79692ef2825fa0b90d8b563e95ab3b6ad206446bc2f0188713cf4e3cdba5daf81be75486e04b
-
Filesize
720KB
MD5d36f5530cd564bbe628286ce945ab03f
SHA18c656f404de52c1165bc819b5a07653c8efd128d
SHA256ba3a50930e7a144637faf88a98f2990a27532bfd20a93dc160eb2db4fbc17b58
SHA5128980b09edb0d68f96c92623da1cac2c3c9e75467bff68263997d43393856ba979cadddddcd6914b7cdb8803df643e85001c1e3aecfc97388175bbb7fbc9cc45c
-
Filesize
3.1MB
MD5cd0eda8961ff27f4b34611bab9a4c301
SHA13894f34ccc797c24d4acae71ac95545db0e6aebb
SHA256fa885e9ea1293552cb45a89e740426fa9c313225ff77ad1980dfea83b6c4a91c
SHA512c32437fdbae6001659864f17f3694b92184059ab35ffceed77eb79692ef2825fa0b90d8b563e95ab3b6ad206446bc2f0188713cf4e3cdba5daf81be75486e04b
-
Filesize
3.1MB
MD5cd0eda8961ff27f4b34611bab9a4c301
SHA13894f34ccc797c24d4acae71ac95545db0e6aebb
SHA256fa885e9ea1293552cb45a89e740426fa9c313225ff77ad1980dfea83b6c4a91c
SHA512c32437fdbae6001659864f17f3694b92184059ab35ffceed77eb79692ef2825fa0b90d8b563e95ab3b6ad206446bc2f0188713cf4e3cdba5daf81be75486e04b
-
Filesize
720KB
MD5d36f5530cd564bbe628286ce945ab03f
SHA18c656f404de52c1165bc819b5a07653c8efd128d
SHA256ba3a50930e7a144637faf88a98f2990a27532bfd20a93dc160eb2db4fbc17b58
SHA5128980b09edb0d68f96c92623da1cac2c3c9e75467bff68263997d43393856ba979cadddddcd6914b7cdb8803df643e85001c1e3aecfc97388175bbb7fbc9cc45c
-
Filesize
720KB
MD5d36f5530cd564bbe628286ce945ab03f
SHA18c656f404de52c1165bc819b5a07653c8efd128d
SHA256ba3a50930e7a144637faf88a98f2990a27532bfd20a93dc160eb2db4fbc17b58
SHA5128980b09edb0d68f96c92623da1cac2c3c9e75467bff68263997d43393856ba979cadddddcd6914b7cdb8803df643e85001c1e3aecfc97388175bbb7fbc9cc45c