Analysis

  • max time kernel
    152s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-09-2022 15:53

General

  • Target

    ca4a22ce761737a04ebdba0fd8063a81642d7d96fea052c8debe9acf7791df20.exe

  • Size

    3.4MB

  • MD5

    dc21a8a77238419f38f09d31ed3440b7

  • SHA1

    2a8f8431db1f03ede2c9b87eb4454b89cb0e9060

  • SHA256

    ca4a22ce761737a04ebdba0fd8063a81642d7d96fea052c8debe9acf7791df20

  • SHA512

    fddf7347f150c1908b252255dbc1a8dd254446747c4eaf7fd88eee3dc2cfdd35054d626b4e4bd7b9f74e2ff7c13d0079f4df04b5c7a8a30d712166fedfca1d7d

  • SSDEEP

    49152:NXIK9iC4wSi+OXS6mOdOsVzPa4DnkcEr3JuRU+TAyPM5Bqe2t4dpPS3AOcD65:CK9d4wb9MO1RPa44cElYThPMs8PSiG

Score
10/10

Malware Config

Signatures

  • BLISTER

    BLISTER is a downloader used to deliver other malware families.

  • Detect Blister loader x32 6 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ca4a22ce761737a04ebdba0fd8063a81642d7d96fea052c8debe9acf7791df20.exe
    "C:\Users\Admin\AppData\Local\Temp\ca4a22ce761737a04ebdba0fd8063a81642d7d96fea052c8debe9acf7791df20.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4216
    • C:\Windows\SYSTEM32\Rundll32.exe
      Rundll32.exe C:\Users\Admin\AppData\Local\Temp\dirtempdata\api.dll,LaunchColorCpl
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:816
      • C:\Windows\SysWOW64\rundll32.exe
        Rundll32.exe C:\Users\Admin\AppData\Local\Temp\dirtempdata\api.dll,LaunchColorCpl
        3⤵
        • Loads dropped DLL
        PID:4936
    • C:\Windows\SYSTEM32\Rundll32.exe
      Rundll32.exe C:\Users\Admin\AppData\Local\Temp\dirtempdata\diagnostic.dll,LaunchColorCpl
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2012
      • C:\Windows\SysWOW64\rundll32.exe
        Rundll32.exe C:\Users\Admin\AppData\Local\Temp\dirtempdata\diagnostic.dll,LaunchColorCpl
        3⤵
        • Loads dropped DLL
        PID:756

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\dirtempdata\api.dll

    Filesize

    3.1MB

    MD5

    cd0eda8961ff27f4b34611bab9a4c301

    SHA1

    3894f34ccc797c24d4acae71ac95545db0e6aebb

    SHA256

    fa885e9ea1293552cb45a89e740426fa9c313225ff77ad1980dfea83b6c4a91c

    SHA512

    c32437fdbae6001659864f17f3694b92184059ab35ffceed77eb79692ef2825fa0b90d8b563e95ab3b6ad206446bc2f0188713cf4e3cdba5daf81be75486e04b

  • C:\Users\Admin\AppData\Local\Temp\dirtempdata\api.dll

    Filesize

    3.1MB

    MD5

    cd0eda8961ff27f4b34611bab9a4c301

    SHA1

    3894f34ccc797c24d4acae71ac95545db0e6aebb

    SHA256

    fa885e9ea1293552cb45a89e740426fa9c313225ff77ad1980dfea83b6c4a91c

    SHA512

    c32437fdbae6001659864f17f3694b92184059ab35ffceed77eb79692ef2825fa0b90d8b563e95ab3b6ad206446bc2f0188713cf4e3cdba5daf81be75486e04b

  • C:\Users\Admin\AppData\Local\Temp\dirtempdata\diagnostic.dll

    Filesize

    720KB

    MD5

    d36f5530cd564bbe628286ce945ab03f

    SHA1

    8c656f404de52c1165bc819b5a07653c8efd128d

    SHA256

    ba3a50930e7a144637faf88a98f2990a27532bfd20a93dc160eb2db4fbc17b58

    SHA512

    8980b09edb0d68f96c92623da1cac2c3c9e75467bff68263997d43393856ba979cadddddcd6914b7cdb8803df643e85001c1e3aecfc97388175bbb7fbc9cc45c

  • C:\Users\Admin\AppData\Local\Temp\dirtempdata\diagnostic.dll

    Filesize

    720KB

    MD5

    d36f5530cd564bbe628286ce945ab03f

    SHA1

    8c656f404de52c1165bc819b5a07653c8efd128d

    SHA256

    ba3a50930e7a144637faf88a98f2990a27532bfd20a93dc160eb2db4fbc17b58

    SHA512

    8980b09edb0d68f96c92623da1cac2c3c9e75467bff68263997d43393856ba979cadddddcd6914b7cdb8803df643e85001c1e3aecfc97388175bbb7fbc9cc45c

  • memory/756-138-0x0000000000000000-mapping.dmp

  • memory/756-141-0x0000000017170000-0x0000000017227000-memory.dmp

    Filesize

    732KB

  • memory/816-132-0x0000000000000000-mapping.dmp

  • memory/2012-136-0x0000000000000000-mapping.dmp

  • memory/4936-134-0x0000000000000000-mapping.dmp

  • memory/4936-140-0x0000000017170000-0x0000000017483000-memory.dmp

    Filesize

    3.1MB