Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29-02-2024 17:44
Behavioral task
behavioral1
Sample
af175128a823db1274fc244d8f5a46bd.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
af175128a823db1274fc244d8f5a46bd.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$TEMP/lib_npp/libcef.dll
Resource
win7-20240221-en
General
-
Target
$TEMP/lib_npp/libcef.dll
-
Size
29.8MB
-
MD5
0e8f94415c1e7694cb6b88bbf17f9339
-
SHA1
df8be7a1694144e1613300c9e60da321b49fdd79
-
SHA256
c1e6d8d159d05d34b6d97ff8629c0a266dd7b7c0665f19a5defc33aaa307f5e2
-
SHA512
9f09399507b41c50a9838c1a26debcc3a405cc8c2191bbb7ef6d8b52ce443e532ae90ddd03a1f6a0eb50b2e8cd6b42a542872e8d717353692f0ecd82fef1b7ff
-
SSDEEP
786432:u7GbWhs7Bcgr7wOw/2jt+KOY5rr4/ITehQ57c/RO2Tp7XvQT5:NbWhs7Bcgr7wtKt+KOY5rr4/ITeyc/RK
Malware Config
Signatures
-
Detect Blister loader x32 1 IoCs
Processes:
resource yara_rule behavioral4/memory/4296-7-0x0000000072F10000-0x0000000074D1F000-memory.dmp family_blister_x32 -
Processes:
resource yara_rule behavioral4/memory/4296-7-0x0000000072F10000-0x0000000074D1F000-memory.dmp vmprotect -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
rundll32.exepid process 4296 rundll32.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
rundll32.exepid process 4296 rundll32.exe 4296 rundll32.exe 4296 rundll32.exe 4296 rundll32.exe 4296 rundll32.exe 4296 rundll32.exe 4296 rundll32.exe 4296 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1360 wrote to memory of 4296 1360 rundll32.exe rundll32.exe PID 1360 wrote to memory of 4296 1360 rundll32.exe rundll32.exe PID 1360 wrote to memory of 4296 1360 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$TEMP\lib_npp\libcef.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$TEMP\lib_npp\libcef.dll,#12⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4296
-