Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29-12-2023 23:47
Static task
static1
Behavioral task
behavioral1
Sample
07756f43e7e8a0f53e79c210ddb2a0f6.exe
Resource
win7-20231215-en
General
-
Target
07756f43e7e8a0f53e79c210ddb2a0f6.exe
-
Size
3.7MB
-
MD5
07756f43e7e8a0f53e79c210ddb2a0f6
-
SHA1
c38c5d947fd9ecc9a326756307b3c1449dff00b7
-
SHA256
2a0152a3160b530e6fb4b5427b10e610bb2d3b375b38d9a1437d3ead6ff4b92d
-
SHA512
e37089aa356af57c698ae86a7d1aaf1417ebc6d055cc448ccde1148d4f01361c529559595080d9e207b29b9f4b503b4359981da34ec0d1ecded0c916c16170d6
-
SSDEEP
98304:n372j4yiDFuXOvWn5ZTda/lt0Jj0pyC2sGiupo7Jusew:niKHvWn5JdYT090svzo7Jug
Malware Config
Extracted
bitrat
1.38
139.28.219.45:443
-
communication_password
a76d949640a165da25ccfe9a8fd82c8a
-
tor_process
tor
Signatures
-
Detect Blister loader x32 2 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\bibs_work\WMVCORE.DLL family_blister_x32 behavioral1/memory/1752-3-0x000000002BD90000-0x000000002C277000-memory.dmp family_blister_x32 -
Loads dropped DLL 1 IoCs
Processes:
07756f43e7e8a0f53e79c210ddb2a0f6.exepid process 1752 07756f43e7e8a0f53e79c210ddb2a0f6.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
07756f43e7e8a0f53e79c210ddb2a0f6.exepid process 1752 07756f43e7e8a0f53e79c210ddb2a0f6.exe 1752 07756f43e7e8a0f53e79c210ddb2a0f6.exe 1752 07756f43e7e8a0f53e79c210ddb2a0f6.exe 1752 07756f43e7e8a0f53e79c210ddb2a0f6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
Processes:
resource yara_rule C:\ProgramData\Helps_Config\Helps_Config.exe nsis_installer_1 C:\ProgramData\Helps_Config\Helps_Config.exe nsis_installer_2 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
07756f43e7e8a0f53e79c210ddb2a0f6.exedescription pid process Token: SeDebugPrivilege 1752 07756f43e7e8a0f53e79c210ddb2a0f6.exe Token: SeShutdownPrivilege 1752 07756f43e7e8a0f53e79c210ddb2a0f6.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
07756f43e7e8a0f53e79c210ddb2a0f6.exepid process 1752 07756f43e7e8a0f53e79c210ddb2a0f6.exe 1752 07756f43e7e8a0f53e79c210ddb2a0f6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\07756f43e7e8a0f53e79c210ddb2a0f6.exe"C:\Users\Admin\AppData\Local\Temp\07756f43e7e8a0f53e79c210ddb2a0f6.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1752
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}1⤵PID:2824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
109KB
MD5aa6850712e9f32426d27a9d6a57d2f9d
SHA197218ea3d0ed5d0e66bc807b4a636e3d741852d0
SHA256107cf9f75765b0866ee3417eb169006aabd5bc20c38aa9786a17f234740c76fa
SHA5120be6bb118c248fca06869686580f77918bf78ec157a764b88851fcce45b007ffe4767ac60868540d92ac98f075750c9a437870ce058a5e4d06a63e2c58429109
-
Filesize
280KB
MD5ff49304f8d64bfde7d41354c68ae756a
SHA1332bbc9dc9c07acb942c12da37df58173515234b
SHA2560097d7e92ca814025d74edde9ff9ce00dda57bff09d79a43ac8fee0fac4fd27c
SHA512d7b132cf82414340f5d841f061e8ea971c39ff62598db638d10f554979cc280d54753155aa523332056d279e12b57a2557674f1f82aa5a8325fb6551396cfee9