Analysis

  • max time kernel
    13s
  • max time network
    12s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230831-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/09/2023, 04:20

General

  • Target

    BLTools v2.0 [CRACKED BY INJUAN]/BLTools v2.0 [CRACKED BY INJUAN].exe

  • Size

    1.2MB

  • MD5

    9c70f8b3a4a01947d4260ae19cea05ca

  • SHA1

    d8841c9a1660a897b10d83f6e2e108320b7097ee

  • SHA256

    3f9cea87d638e09da9974517300b23a91495d4e0b51314a3f4a2183c481e5fe5

  • SHA512

    d3a98f4ef14896bd23a33362c871c6679bc60eebad5165e425be15e3f6de3c3855852a44bf2e87719c1090bde507da5591ced064fe7c1c02a529a9d0a5b9bf3b

  • SSDEEP

    24576:nJlh9bDuaI1NMiYz/Mr334++p8y9Nm4pvBWYETXJplm:nJq+DE4++rM41qVplm

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\BLTools v2.0 [CRACKED BY INJUAN]\BLTools v2.0 [CRACKED BY INJUAN].exe
    "C:\Users\Admin\AppData\Local\Temp\BLTools v2.0 [CRACKED BY INJUAN]\BLTools v2.0 [CRACKED BY INJUAN].exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2404
    • C:\Users\Admin\AppData\Local\Temp\BLTools v2.0 [CRACKED BY INJUAN]\crack.exe
      "C:\Users\Admin\AppData\Local\Temp\BLTools v2.0 [CRACKED BY INJUAN]\crack.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Suspicious behavior: AddClipboardFormatListener
      PID:1736

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\BLTools v2.0 [CRACKED BY INJUAN]\crack.exe

    Filesize

    18KB

    MD5

    904ec5aa2737224bbad40a88aeaafd69

    SHA1

    84235e4e57d8a8bb3b16ebb52ecacb5a8c860fb1

    SHA256

    a13aa730a9c809328d6d3955d41784a9dcf03c3b2ad9e2fbeffb155e0cccfe4d

    SHA512

    5dd0a5cfd43769515868ca057f4ef2e542756e6d2125aad5661bda05f2b8943a352a19e274a2b32d77ded7e437290dadd230c5f2c2729b72daac117f995fd3c7

  • C:\Users\Admin\AppData\Local\Temp\BLTools v2.0 [CRACKED BY INJUAN]\crack.exe

    Filesize

    18KB

    MD5

    904ec5aa2737224bbad40a88aeaafd69

    SHA1

    84235e4e57d8a8bb3b16ebb52ecacb5a8c860fb1

    SHA256

    a13aa730a9c809328d6d3955d41784a9dcf03c3b2ad9e2fbeffb155e0cccfe4d

    SHA512

    5dd0a5cfd43769515868ca057f4ef2e542756e6d2125aad5661bda05f2b8943a352a19e274a2b32d77ded7e437290dadd230c5f2c2729b72daac117f995fd3c7

  • C:\Users\Admin\AppData\Local\Temp\BLTools v2.0 [CRACKED BY INJUAN]\crack.exe

    Filesize

    18KB

    MD5

    904ec5aa2737224bbad40a88aeaafd69

    SHA1

    84235e4e57d8a8bb3b16ebb52ecacb5a8c860fb1

    SHA256

    a13aa730a9c809328d6d3955d41784a9dcf03c3b2ad9e2fbeffb155e0cccfe4d

    SHA512

    5dd0a5cfd43769515868ca057f4ef2e542756e6d2125aad5661bda05f2b8943a352a19e274a2b32d77ded7e437290dadd230c5f2c2729b72daac117f995fd3c7

  • memory/1736-21-0x0000000000A00000-0x0000000000A0C000-memory.dmp

    Filesize

    48KB

  • memory/1736-24-0x00007FFFB8F20000-0x00007FFFB99E1000-memory.dmp

    Filesize

    10.8MB

  • memory/1736-25-0x000000001BB20000-0x000000001BB30000-memory.dmp

    Filesize

    64KB

  • memory/1736-26-0x00007FFFB8F20000-0x00007FFFB99E1000-memory.dmp

    Filesize

    10.8MB

  • memory/1736-27-0x000000001BB20000-0x000000001BB30000-memory.dmp

    Filesize

    64KB