Overview
overview
10Static
static
10BlitzedV12...12.exe
windows7-x64
7BlitzedV12...12.exe
windows10-2004-x64
7BlitzedV12...xe.xml
windows7-x64
3BlitzedV12...xe.xml
windows10-2004-x64
1BlitzedV12...OR.dll
windows7-x64
1BlitzedV12...OR.dll
windows10-2004-x64
1BlitzedV12...hy.dll
windows7-x64
1BlitzedV12...hy.dll
windows10-2004-x64
1BlitzedV12...ed.exe
windows7-x64
10BlitzedV12...ed.exe
windows10-2004-x64
10BlitzedV12...to.dll
windows7-x64
1BlitzedV12...to.dll
windows10-2004-x64
1BlitzedV12...on.dll
windows7-x64
1BlitzedV12...on.dll
windows10-2004-x64
1BlitzedV12...le.exe
windows7-x64
3BlitzedV12...le.exe
windows10-2004-x64
3Analysis
-
max time kernel
26s -
max time network
21s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14-08-2024 21:32
Behavioral task
behavioral1
Sample
BlitzedV12/BlitzedGrabberV12.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
BlitzedV12/BlitzedGrabberV12.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
BlitzedV12/BlitzedGrabberV12.exe.xml
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
BlitzedV12/BlitzedGrabberV12.exe.xml
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
BlitzedV12/Resources/APIFOR.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
BlitzedV12/Resources/APIFOR.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
BlitzedV12/Resources/Anarchy.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
BlitzedV12/Resources/Anarchy.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
BlitzedV12/Resources/Blitzed.exe
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
BlitzedV12/Resources/Blitzed.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
BlitzedV12/Resources/BouncyCastle.Crypto.dll
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
BlitzedV12/Resources/BouncyCastle.Crypto.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
BlitzedV12/Resources/Newtonsoft.Json.dll
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
BlitzedV12/Resources/Newtonsoft.Json.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
BlitzedV12/Resources/UltraEmbeddable.exe
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
BlitzedV12/Resources/UltraEmbeddable.exe
Resource
win10v2004-20240802-en
General
-
Target
BlitzedV12/Resources/UltraEmbeddable.exe
-
Size
465KB
-
MD5
b6b77d0798d39d7fadd69784c4e47c30
-
SHA1
967af699bd9e0f2f20b0743323e5cdd6c3767ea2
-
SHA256
e5c9880090d757207a5cd373f5e1d20c42d7486c742b3a30a2ee741a7aef5ef8
-
SHA512
5140dcebbeb53c8e74364de824d78d6c5fddcfa08f0ac38ff0d898e71bf4f8630f3b529571a7f64be00981e83af7f85a9b6665aedfaf7f0720995fae8a8e28d6
-
SSDEEP
12288:MXUNgkAIMflOWTUpGY5ObqRKd6G2nHVxxd/2KO:QUNdJMNOWTUQveYd6fHnxsKO
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2504 2304 WerFault.exe UltraEmbeddable.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
UltraEmbeddable.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UltraEmbeddable.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
UltraEmbeddable.exedescription pid process target process PID 2304 wrote to memory of 2504 2304 UltraEmbeddable.exe WerFault.exe PID 2304 wrote to memory of 2504 2304 UltraEmbeddable.exe WerFault.exe PID 2304 wrote to memory of 2504 2304 UltraEmbeddable.exe WerFault.exe PID 2304 wrote to memory of 2504 2304 UltraEmbeddable.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\BlitzedV12\Resources\UltraEmbeddable.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedV12\Resources\UltraEmbeddable.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2304 -s 5522⤵
- Program crash
PID:2504