Analysis
-
max time kernel
7s -
max time network
0s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-01-2025 23:15
Behavioral task
behavioral1
Sample
blast.exe
Resource
win7-20240903-en
windows7-x64
3 signatures
150 seconds
General
-
Target
blast.exe
-
Size
7.6MB
-
MD5
144f0413cbc37e7abfd03ef7db607bbb
-
SHA1
44db66912cc325e195f13ad26e3fb556d145aad8
-
SHA256
de8af9f7e1dd6baee89676f6eb45da2b578b1d4be47d9d3b1751bb98703503c8
-
SHA512
3c1371d814765ee755bb507a62628cb00ae49423d8079d1a8edfbd8d320799503c28bb27ee71933acf015e934b5c6b026d12fe89c904b7b24cfc597191919cfd
-
SSDEEP
196608:1cD+kdywfI9jUCBB7m+mKOY7rXrZusooDmhfvsbnTNWK:K5LIHL7HmBYXrYoaUNt
Score
7/10
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2512 blast.exe -
resource yara_rule behavioral1/files/0x0006000000016ea4-21.dat upx behavioral1/memory/2512-23-0x000007FEF5EA0000-0x000007FEF6505000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2512 2068 blast.exe 30 PID 2068 wrote to memory of 2512 2068 blast.exe 30 PID 2068 wrote to memory of 2512 2068 blast.exe 30
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD59a3d3ae5745a79d276b05a85aea02549
SHA1a5e60cac2ca606df4f7646d052a9c0ea813e7636
SHA25609693bab682495b01de8a24c435ca5900e11d2d0f4f0807dae278b3a94770889
SHA51246840b820ee3c0fa511596124eb364da993ec7ae1670843a15afd40ac63f2c61846434be84d191bd53f7f5f4e17fad549795822bb2b9c792ac22a1c26e5adf69