Analysis
-
max time kernel
13s -
max time network
12s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
01/09/2023, 04:20
Static task
static1
Behavioral task
behavioral1
Sample
BLTools v2.0 [CRACKED BY INJUAN]/BLTools v2.0 [CRACKED BY INJUAN].exe
Resource
win10v2004-20230831-en
General
-
Target
BLTools v2.0 [CRACKED BY INJUAN]/BLTools v2.0 [CRACKED BY INJUAN].exe
-
Size
1.2MB
-
MD5
9c70f8b3a4a01947d4260ae19cea05ca
-
SHA1
d8841c9a1660a897b10d83f6e2e108320b7097ee
-
SHA256
3f9cea87d638e09da9974517300b23a91495d4e0b51314a3f4a2183c481e5fe5
-
SHA512
d3a98f4ef14896bd23a33362c871c6679bc60eebad5165e425be15e3f6de3c3855852a44bf2e87719c1090bde507da5591ced064fe7c1c02a529a9d0a5b9bf3b
-
SSDEEP
24576:nJlh9bDuaI1NMiYz/Mr334++p8y9Nm4pvBWYETXJplm:nJq+DE4++rM41qVplm
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4078585466-1563564224-3678410669-1000\Control Panel\International\Geo\Nation BLTools v2.0 [CRACKED BY INJUAN].exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\crack.exe crack.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\crack.exe crack.exe -
Executes dropped EXE 1 IoCs
pid Process 1736 crack.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1736 crack.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2404 wrote to memory of 1736 2404 BLTools v2.0 [CRACKED BY INJUAN].exe 84 PID 2404 wrote to memory of 1736 2404 BLTools v2.0 [CRACKED BY INJUAN].exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\BLTools v2.0 [CRACKED BY INJUAN]\BLTools v2.0 [CRACKED BY INJUAN].exe"C:\Users\Admin\AppData\Local\Temp\BLTools v2.0 [CRACKED BY INJUAN]\BLTools v2.0 [CRACKED BY INJUAN].exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\BLTools v2.0 [CRACKED BY INJUAN]\crack.exe"C:\Users\Admin\AppData\Local\Temp\BLTools v2.0 [CRACKED BY INJUAN]\crack.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
PID:1736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18KB
MD5904ec5aa2737224bbad40a88aeaafd69
SHA184235e4e57d8a8bb3b16ebb52ecacb5a8c860fb1
SHA256a13aa730a9c809328d6d3955d41784a9dcf03c3b2ad9e2fbeffb155e0cccfe4d
SHA5125dd0a5cfd43769515868ca057f4ef2e542756e6d2125aad5661bda05f2b8943a352a19e274a2b32d77ded7e437290dadd230c5f2c2729b72daac117f995fd3c7
-
Filesize
18KB
MD5904ec5aa2737224bbad40a88aeaafd69
SHA184235e4e57d8a8bb3b16ebb52ecacb5a8c860fb1
SHA256a13aa730a9c809328d6d3955d41784a9dcf03c3b2ad9e2fbeffb155e0cccfe4d
SHA5125dd0a5cfd43769515868ca057f4ef2e542756e6d2125aad5661bda05f2b8943a352a19e274a2b32d77ded7e437290dadd230c5f2c2729b72daac117f995fd3c7
-
Filesize
18KB
MD5904ec5aa2737224bbad40a88aeaafd69
SHA184235e4e57d8a8bb3b16ebb52ecacb5a8c860fb1
SHA256a13aa730a9c809328d6d3955d41784a9dcf03c3b2ad9e2fbeffb155e0cccfe4d
SHA5125dd0a5cfd43769515868ca057f4ef2e542756e6d2125aad5661bda05f2b8943a352a19e274a2b32d77ded7e437290dadd230c5f2c2729b72daac117f995fd3c7