Analysis
-
max time kernel
120s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29-02-2024 17:44
Behavioral task
behavioral1
Sample
af175128a823db1274fc244d8f5a46bd.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
af175128a823db1274fc244d8f5a46bd.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$TEMP/lib_npp/libcef.dll
Resource
win7-20240221-en
General
-
Target
$TEMP/lib_npp/libcef.dll
-
Size
29.8MB
-
MD5
0e8f94415c1e7694cb6b88bbf17f9339
-
SHA1
df8be7a1694144e1613300c9e60da321b49fdd79
-
SHA256
c1e6d8d159d05d34b6d97ff8629c0a266dd7b7c0665f19a5defc33aaa307f5e2
-
SHA512
9f09399507b41c50a9838c1a26debcc3a405cc8c2191bbb7ef6d8b52ce443e532ae90ddd03a1f6a0eb50b2e8cd6b42a542872e8d717353692f0ecd82fef1b7ff
-
SSDEEP
786432:u7GbWhs7Bcgr7wOw/2jt+KOY5rr4/ITehQ57c/RO2Tp7XvQT5:NbWhs7Bcgr7wtKt+KOY5rr4/ITeyc/RK
Malware Config
Signatures
-
Detect Blister loader x32 1 IoCs
Processes:
resource yara_rule behavioral3/memory/2512-16-0x000000006FEE0000-0x0000000071CEF000-memory.dmp family_blister_x32 -
Processes:
resource yara_rule behavioral3/memory/2512-16-0x000000006FEE0000-0x0000000071CEF000-memory.dmp vmprotect -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
rundll32.exepid process 2512 rundll32.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
rundll32.exepid process 2512 rundll32.exe 2512 rundll32.exe 2512 rundll32.exe 2512 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 2492 wrote to memory of 2512 2492 rundll32.exe rundll32.exe PID 2492 wrote to memory of 2512 2492 rundll32.exe rundll32.exe PID 2492 wrote to memory of 2512 2492 rundll32.exe rundll32.exe PID 2492 wrote to memory of 2512 2492 rundll32.exe rundll32.exe PID 2492 wrote to memory of 2512 2492 rundll32.exe rundll32.exe PID 2492 wrote to memory of 2512 2492 rundll32.exe rundll32.exe PID 2492 wrote to memory of 2512 2492 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$TEMP\lib_npp\libcef.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$TEMP\lib_npp\libcef.dll,#12⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2512
-