Analysis

  • max time kernel
    9s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    02-04-2023 06:49

General

  • Target

    blitzed.exe

  • Size

    34.0MB

  • MD5

    677514f05118d9b3cd0e0c4eb4f26087

  • SHA1

    c3883d160a7ceca9d2d441c6720370d510ed5b43

  • SHA256

    abeaa67ebce8e8b6d406834c8d016567e5d5bf4e1d2209a45a96c300828b8ef8

  • SHA512

    cfda4d80b541de89046b2678ee52f2df8ef7a9308da8ea74a4d071f9f7e0f1bbba202210f84e74a5d6d4a1653b4bfa4ab2a2a12b093b591182c8746ba801bd00

  • SSDEEP

    393216:kjfeZBR3LD34p21mu7L/FD/ftnSyY+k4tO2dQ2lN/m3pW+9J8eHzD8YVQJdGd8v:OoP3LEpOmCLtTtY4tndQGK19J8eHnKh

Malware Config

Signatures

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 7 IoCs
  • Obfuscated with Agile.Net obfuscator 34 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Detects Pyinstaller 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\blitzed.exe
    "C:\Users\Admin\AppData\Local\Temp\blitzed.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1888
    • C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE
      "C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:904
    • C:\Users\Admin\AppData\Local\Temp\ORACLE.EXE
      "C:\Users\Admin\AppData\Local\Temp\ORACLE.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:520
      • C:\Windows\system32\cmd.exe
        cmd /C "REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V WindowsUpdate /t REG_SZ /F /D C:\Users\Admin\AppData\Local\Temp\ORACLE.EXE"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1720
        • C:\Windows\system32\reg.exe
          REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V WindowsUpdate /t REG_SZ /F /D C:\Users\Admin\AppData\Local\Temp\ORACLE.EXE
          4⤵
          • Adds Run key to start application
          • Modifies registry key
          PID:1352
    • C:\Users\Admin\AppData\Local\Temp\RECOVERY.EXE
      "C:\Users\Admin\AppData\Local\Temp\RECOVERY.EXE"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1684
      • C:\Users\Admin\AppData\Local\Temp\RECOVERY.EXE
        "C:\Users\Admin\AppData\Local\Temp\RECOVERY.EXE"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1108

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE
    Filesize

    1.6MB

    MD5

    228a69dc15032fd0fb7100ff8561185e

    SHA1

    f8dbc89fed8078da7f306cb78b92ce04a0bdeb00

    SHA256

    920bec9d500f6446b84399ab4c84858d0f0d7d1abb2e0377399ebbc4bafad709

    SHA512

    373621c4743fa72571b3c8375aa6f7852303a821558b016b002d2af07154787d978f66696db89eeed8fe41f4aed5d66b690d4f87469939f9b1dea2ac2b9101f1

  • C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE
    Filesize

    1.6MB

    MD5

    228a69dc15032fd0fb7100ff8561185e

    SHA1

    f8dbc89fed8078da7f306cb78b92ce04a0bdeb00

    SHA256

    920bec9d500f6446b84399ab4c84858d0f0d7d1abb2e0377399ebbc4bafad709

    SHA512

    373621c4743fa72571b3c8375aa6f7852303a821558b016b002d2af07154787d978f66696db89eeed8fe41f4aed5d66b690d4f87469939f9b1dea2ac2b9101f1

  • C:\Users\Admin\AppData\Local\Temp\ORACLE.EXE
    Filesize

    10.4MB

    MD5

    4a62e0a398ce522dc6dd4b8e16ab868b

    SHA1

    ade65092f26a1caf259e6db07786577956a013fa

    SHA256

    3e7d03bc296e14587a1bc62155046aa28987a37d35ada0be9f5ff3fadbec3ce7

    SHA512

    cd037cc0a7e568a1012bd623f1b7c354be3a055850c5eef3ed7ea63031a76a588071da9522c59ff4012ab9533daaeabbaf33c959e58591ba20c02c6685d261b6

  • C:\Users\Admin\AppData\Local\Temp\ORACLE.EXE
    Filesize

    10.4MB

    MD5

    4a62e0a398ce522dc6dd4b8e16ab868b

    SHA1

    ade65092f26a1caf259e6db07786577956a013fa

    SHA256

    3e7d03bc296e14587a1bc62155046aa28987a37d35ada0be9f5ff3fadbec3ce7

    SHA512

    cd037cc0a7e568a1012bd623f1b7c354be3a055850c5eef3ed7ea63031a76a588071da9522c59ff4012ab9533daaeabbaf33c959e58591ba20c02c6685d261b6

  • C:\Users\Admin\AppData\Local\Temp\RECOVERY.EXE
    Filesize

    21.6MB

    MD5

    0207955d8c2b954f07309937f6caa1d3

    SHA1

    3bf066874405a480a79f8667f9a89d01749a6aa9

    SHA256

    f73d2cc5021cdea3ca2de1940b6ab92fdb9814e9d47b2df36f310dc0facf40ca

    SHA512

    b67d643beda0b9ff299a75cf7c7833d2d44c9d14bb341319fe418d5cc3532cf2ca9d57d5fd6b499ef923a7fbb93427da0635243a880b03bda4a9ba7863115082

  • C:\Users\Admin\AppData\Local\Temp\RECOVERY.EXE
    Filesize

    21.6MB

    MD5

    0207955d8c2b954f07309937f6caa1d3

    SHA1

    3bf066874405a480a79f8667f9a89d01749a6aa9

    SHA256

    f73d2cc5021cdea3ca2de1940b6ab92fdb9814e9d47b2df36f310dc0facf40ca

    SHA512

    b67d643beda0b9ff299a75cf7c7833d2d44c9d14bb341319fe418d5cc3532cf2ca9d57d5fd6b499ef923a7fbb93427da0635243a880b03bda4a9ba7863115082

  • C:\Users\Admin\AppData\Local\Temp\RECOVERY.EXE
    Filesize

    21.6MB

    MD5

    0207955d8c2b954f07309937f6caa1d3

    SHA1

    3bf066874405a480a79f8667f9a89d01749a6aa9

    SHA256

    f73d2cc5021cdea3ca2de1940b6ab92fdb9814e9d47b2df36f310dc0facf40ca

    SHA512

    b67d643beda0b9ff299a75cf7c7833d2d44c9d14bb341319fe418d5cc3532cf2ca9d57d5fd6b499ef923a7fbb93427da0635243a880b03bda4a9ba7863115082

  • C:\Users\Admin\AppData\Local\Temp\_MEI16842\python311.dll
    Filesize

    5.5MB

    MD5

    a72993488cecd88b3e19487d646f88f6

    SHA1

    5d359f4121e0be04a483f9ad1d8203ffc958f9a0

    SHA256

    aa1e959dcff75a343b448a797d8a5a041eb03b27565a30f70fd081df7a285038

    SHA512

    c895176784b9ac89c9b996c02ec0d0a3f7cd6ebf653a277c20dec104da6a11db084c53dd47c7b6653a448d877ad8e5e79c27db4ea6365ebb8ca2a78aa9c61b38

  • C:\Users\Admin\AppData\Local\Temp\dcfb00f9-5ae7-4197-ba59-e48107e40d35\GunaDotNetRT.dll
    Filesize

    136KB

    MD5

    9af5eb006bb0bab7f226272d82c896c7

    SHA1

    c2a5bb42a5f08f4dc821be374b700652262308f0

    SHA256

    77dc05a6bda90757f66552ee3f469b09f1e00732b4edca0f542872fb591ed9db

    SHA512

    7badd41be4c1039302fda9bba19d374ec9446ce24b7db33b66bee4ef38180d1abcd666d2aea468e7e452aa1e1565eedfefed582bf1c2fe477a4171d99d48772a

  • \Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE
    Filesize

    1.6MB

    MD5

    228a69dc15032fd0fb7100ff8561185e

    SHA1

    f8dbc89fed8078da7f306cb78b92ce04a0bdeb00

    SHA256

    920bec9d500f6446b84399ab4c84858d0f0d7d1abb2e0377399ebbc4bafad709

    SHA512

    373621c4743fa72571b3c8375aa6f7852303a821558b016b002d2af07154787d978f66696db89eeed8fe41f4aed5d66b690d4f87469939f9b1dea2ac2b9101f1

  • \Users\Admin\AppData\Local\Temp\ORACLE.EXE
    Filesize

    10.4MB

    MD5

    4a62e0a398ce522dc6dd4b8e16ab868b

    SHA1

    ade65092f26a1caf259e6db07786577956a013fa

    SHA256

    3e7d03bc296e14587a1bc62155046aa28987a37d35ada0be9f5ff3fadbec3ce7

    SHA512

    cd037cc0a7e568a1012bd623f1b7c354be3a055850c5eef3ed7ea63031a76a588071da9522c59ff4012ab9533daaeabbaf33c959e58591ba20c02c6685d261b6

  • \Users\Admin\AppData\Local\Temp\ORACLE.EXE
    Filesize

    10.4MB

    MD5

    4a62e0a398ce522dc6dd4b8e16ab868b

    SHA1

    ade65092f26a1caf259e6db07786577956a013fa

    SHA256

    3e7d03bc296e14587a1bc62155046aa28987a37d35ada0be9f5ff3fadbec3ce7

    SHA512

    cd037cc0a7e568a1012bd623f1b7c354be3a055850c5eef3ed7ea63031a76a588071da9522c59ff4012ab9533daaeabbaf33c959e58591ba20c02c6685d261b6

  • \Users\Admin\AppData\Local\Temp\RECOVERY.EXE
    Filesize

    21.6MB

    MD5

    0207955d8c2b954f07309937f6caa1d3

    SHA1

    3bf066874405a480a79f8667f9a89d01749a6aa9

    SHA256

    f73d2cc5021cdea3ca2de1940b6ab92fdb9814e9d47b2df36f310dc0facf40ca

    SHA512

    b67d643beda0b9ff299a75cf7c7833d2d44c9d14bb341319fe418d5cc3532cf2ca9d57d5fd6b499ef923a7fbb93427da0635243a880b03bda4a9ba7863115082

  • \Users\Admin\AppData\Local\Temp\RECOVERY.EXE
    Filesize

    21.6MB

    MD5

    0207955d8c2b954f07309937f6caa1d3

    SHA1

    3bf066874405a480a79f8667f9a89d01749a6aa9

    SHA256

    f73d2cc5021cdea3ca2de1940b6ab92fdb9814e9d47b2df36f310dc0facf40ca

    SHA512

    b67d643beda0b9ff299a75cf7c7833d2d44c9d14bb341319fe418d5cc3532cf2ca9d57d5fd6b499ef923a7fbb93427da0635243a880b03bda4a9ba7863115082

  • \Users\Admin\AppData\Local\Temp\RECOVERY.EXE
    Filesize

    21.6MB

    MD5

    0207955d8c2b954f07309937f6caa1d3

    SHA1

    3bf066874405a480a79f8667f9a89d01749a6aa9

    SHA256

    f73d2cc5021cdea3ca2de1940b6ab92fdb9814e9d47b2df36f310dc0facf40ca

    SHA512

    b67d643beda0b9ff299a75cf7c7833d2d44c9d14bb341319fe418d5cc3532cf2ca9d57d5fd6b499ef923a7fbb93427da0635243a880b03bda4a9ba7863115082

  • \Users\Admin\AppData\Local\Temp\_MEI16842\python311.dll
    Filesize

    5.5MB

    MD5

    a72993488cecd88b3e19487d646f88f6

    SHA1

    5d359f4121e0be04a483f9ad1d8203ffc958f9a0

    SHA256

    aa1e959dcff75a343b448a797d8a5a041eb03b27565a30f70fd081df7a285038

    SHA512

    c895176784b9ac89c9b996c02ec0d0a3f7cd6ebf653a277c20dec104da6a11db084c53dd47c7b6653a448d877ad8e5e79c27db4ea6365ebb8ca2a78aa9c61b38

  • \Users\Admin\AppData\Local\Temp\dcfb00f9-5ae7-4197-ba59-e48107e40d35\GunaDotNetRT.dll
    Filesize

    136KB

    MD5

    9af5eb006bb0bab7f226272d82c896c7

    SHA1

    c2a5bb42a5f08f4dc821be374b700652262308f0

    SHA256

    77dc05a6bda90757f66552ee3f469b09f1e00732b4edca0f542872fb591ed9db

    SHA512

    7badd41be4c1039302fda9bba19d374ec9446ce24b7db33b66bee4ef38180d1abcd666d2aea468e7e452aa1e1565eedfefed582bf1c2fe477a4171d99d48772a

  • memory/904-206-0x0000000005200000-0x00000000053EE000-memory.dmp
    Filesize

    1.9MB

  • memory/904-116-0x0000000000FD0000-0x000000000117C000-memory.dmp
    Filesize

    1.7MB

  • memory/904-193-0x0000000075150000-0x00000000751D0000-memory.dmp
    Filesize

    512KB

  • memory/904-194-0x0000000005200000-0x00000000053EE000-memory.dmp
    Filesize

    1.9MB

  • memory/904-195-0x0000000005200000-0x00000000053EE000-memory.dmp
    Filesize

    1.9MB

  • memory/904-197-0x0000000005200000-0x00000000053EE000-memory.dmp
    Filesize

    1.9MB

  • memory/904-199-0x0000000005200000-0x00000000053EE000-memory.dmp
    Filesize

    1.9MB

  • memory/904-201-0x0000000005200000-0x00000000053EE000-memory.dmp
    Filesize

    1.9MB

  • memory/904-205-0x00000000741C0000-0x00000000741F7000-memory.dmp
    Filesize

    220KB

  • memory/904-185-0x0000000005200000-0x00000000053F2000-memory.dmp
    Filesize

    1.9MB

  • memory/904-208-0x0000000005200000-0x00000000053EE000-memory.dmp
    Filesize

    1.9MB

  • memory/904-203-0x0000000005200000-0x00000000053EE000-memory.dmp
    Filesize

    1.9MB

  • memory/904-210-0x0000000005200000-0x00000000053EE000-memory.dmp
    Filesize

    1.9MB

  • memory/904-212-0x0000000005200000-0x00000000053EE000-memory.dmp
    Filesize

    1.9MB

  • memory/904-214-0x0000000005200000-0x00000000053EE000-memory.dmp
    Filesize

    1.9MB

  • memory/904-216-0x0000000005200000-0x00000000053EE000-memory.dmp
    Filesize

    1.9MB

  • memory/904-218-0x0000000005200000-0x00000000053EE000-memory.dmp
    Filesize

    1.9MB

  • memory/904-220-0x0000000005200000-0x00000000053EE000-memory.dmp
    Filesize

    1.9MB

  • memory/904-222-0x0000000005200000-0x00000000053EE000-memory.dmp
    Filesize

    1.9MB

  • memory/904-186-0x0000000004B60000-0x0000000004BA0000-memory.dmp
    Filesize

    256KB

  • memory/904-225-0x0000000005200000-0x00000000053EE000-memory.dmp
    Filesize

    1.9MB

  • memory/904-227-0x0000000005200000-0x00000000053EE000-memory.dmp
    Filesize

    1.9MB

  • memory/904-229-0x0000000005200000-0x00000000053EE000-memory.dmp
    Filesize

    1.9MB

  • memory/904-233-0x0000000005200000-0x00000000053EE000-memory.dmp
    Filesize

    1.9MB

  • memory/904-235-0x0000000005200000-0x00000000053EE000-memory.dmp
    Filesize

    1.9MB

  • memory/904-237-0x0000000005200000-0x00000000053EE000-memory.dmp
    Filesize

    1.9MB

  • memory/904-231-0x0000000005200000-0x00000000053EE000-memory.dmp
    Filesize

    1.9MB

  • memory/904-239-0x0000000005200000-0x00000000053EE000-memory.dmp
    Filesize

    1.9MB

  • memory/904-241-0x0000000005200000-0x00000000053EE000-memory.dmp
    Filesize

    1.9MB

  • memory/904-243-0x0000000005200000-0x00000000053EE000-memory.dmp
    Filesize

    1.9MB

  • memory/904-245-0x0000000005200000-0x00000000053EE000-memory.dmp
    Filesize

    1.9MB

  • memory/904-247-0x0000000005200000-0x00000000053EE000-memory.dmp
    Filesize

    1.9MB

  • memory/904-249-0x0000000005200000-0x00000000053EE000-memory.dmp
    Filesize

    1.9MB

  • memory/904-251-0x0000000005200000-0x00000000053EE000-memory.dmp
    Filesize

    1.9MB

  • memory/904-253-0x0000000005200000-0x00000000053EE000-memory.dmp
    Filesize

    1.9MB

  • memory/904-255-0x0000000005200000-0x00000000053EE000-memory.dmp
    Filesize

    1.9MB

  • memory/904-257-0x0000000005200000-0x00000000053EE000-memory.dmp
    Filesize

    1.9MB

  • memory/904-1048-0x0000000004B60000-0x0000000004BA0000-memory.dmp
    Filesize

    256KB