Resubmissions

14/01/2024, 18:04

240114-wnrmdadaf9 9

14/01/2024, 17:02

240114-vj54jacgh6 7

Analysis

  • max time kernel
    602s
  • max time network
    637s
  • platform
    windows11-21h2_x64
  • resource
    win11-20231215-en
  • resource tags

    arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    14/01/2024, 18:04

General

  • Target

    Battly Launcher.exe

  • Size

    139.2MB

  • MD5

    969beb79f34031cdb2e5187ca2e5f38b

  • SHA1

    b5d988b059fe211d165e2352fae764b56b981d34

  • SHA256

    263f3e45c88a49e6f6d25be255001b0bd5ceaef9cb40090cad5d3451624b0691

  • SHA512

    6d826ef260c97da428fde3d169eb363a1ef7b9f9840b5d41b29868c69b10fffc2076620c07ddc53a866ee8dcc728ab1d584b5a41bf9fb2f6635018c552806855

  • SSDEEP

    1572864:s2AJVTuwkScRLHjz5w0I32fRVf9e7iLBt8WPhdPhmKOAlV1CviSONKQubJVpcsAD:vvyJQApeFRqHkblv1kN93k/

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Modifies registry class 14 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Battly Launcher.exe
    "C:\Users\Admin\AppData\Local\Temp\Battly Launcher.exe"
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2492
    • C:\Users\Admin\AppData\Local\Temp\Battly Launcher.exe
      "C:\Users\Admin\AppData\Local\Temp\Battly Launcher.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\BattlyLauncher" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=1884 --field-trial-handle=1888,i,18385732877891182411,4819649218863933360,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
      2⤵
        PID:3088
      • C:\Users\Admin\AppData\Local\Temp\Battly Launcher.exe
        "C:\Users\Admin\AppData\Local\Temp\Battly Launcher.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\BattlyLauncher" --mojo-platform-channel-handle=2292 --field-trial-handle=1888,i,18385732877891182411,4819649218863933360,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
        2⤵
          PID:1172
        • C:\Users\Admin\AppData\Local\Temp\Battly Launcher.exe
          "C:\Users\Admin\AppData\Local\Temp\Battly Launcher.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\BattlyLauncher" --app-user-model-id="Battly Launcher" --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app" --no-sandbox --no-zygote --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=2532 --field-trial-handle=1888,i,18385732877891182411,4819649218863933360,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand /prefetch:1
          2⤵
            PID:4208
          • C:\Users\Admin\AppData\Local\Temp\Battly Launcher.exe
            "C:\Users\Admin\AppData\Local\Temp\Battly Launcher.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --user-data-dir="C:\Users\Admin\AppData\Roaming\BattlyLauncher" --mojo-platform-channel-handle=3204 --field-trial-handle=1888,i,18385732877891182411,4819649218863933360,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
            2⤵
              PID:1924
            • C:\Users\Admin\AppData\Local\Temp\Battly Launcher.exe
              "C:\Users\Admin\AppData\Local\Temp\Battly Launcher.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\BattlyLauncher" --app-user-model-id="Battly Launcher" --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app" --no-sandbox --no-zygote --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3604 --field-trial-handle=1888,i,18385732877891182411,4819649218863933360,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand /prefetch:1
              2⤵
                PID:1304
              • C:\Users\Admin\AppData\Local\Temp\Battly Launcher.exe
                "C:\Users\Admin\AppData\Local\Temp\Battly Launcher.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\BattlyLauncher" --app-user-model-id="Battly Launcher" --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app" --no-sandbox --no-zygote --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3620 --field-trial-handle=1888,i,18385732877891182411,4819649218863933360,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand /prefetch:1
                2⤵
                  PID:4728
                • C:\Users\Admin\AppData\Local\Temp\Battly Launcher.exe
                  "C:\Users\Admin\AppData\Local\Temp\Battly Launcher.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --user-data-dir="C:\Users\Admin\AppData\Roaming\BattlyLauncher" --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAABEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=2384 --field-trial-handle=1888,i,18385732877891182411,4819649218863933360,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
                  2⤵
                  • Drops file in System32 directory
                  • Suspicious behavior: EnumeratesProcesses
                  PID:976
              • C:\Windows\system32\AUDIODG.EXE
                C:\Windows\system32\AUDIODG.EXE 0x00000000000004C4 0x00000000000004D8
                1⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:2076
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc
                1⤵
                  PID:5108

                Network

                MITRE ATT&CK Matrix

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\D3DSCache\d466c90afe4f152a\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.idx

                  Filesize

                  64KB

                  MD5

                  e49f8f528d6ae4ee617f9da90de8035a

                  SHA1

                  003edb76a66228856089bade81c4009d121ee2bc

                  SHA256

                  2e88854f3085ceaf40c03f8a559f180bc4581d6ccd59d43e5d565e912ad2a306

                  SHA512

                  4c3b2b64efab040f441cf4346b3b976d01202c7f5e7e2a4a4f6b8a299cbfa0451bcccd0d06dc4a5d43eaafa757724616b34f22ae66e165edd2a69f8e1bdc01df

                • C:\Users\Admin\AppData\Local\D3DSCache\d466c90afe4f152a\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.lock

                  Filesize

                  4B

                  MD5

                  f49655f856acb8884cc0ace29216f511

                  SHA1

                  cb0f1f87ec0455ec349aaa950c600475ac7b7b6b

                  SHA256

                  7852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba

                  SHA512

                  599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8

                • C:\Users\Admin\AppData\Local\D3DSCache\d466c90afe4f152a\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.val

                  Filesize

                  1008B

                  MD5

                  4a40fa7a8511acaf35c99164b92a263c

                  SHA1

                  75df7fcd338ffa87b2c2dc9cf53f241253bd831c

                  SHA256

                  e0218151ab2ae56b2fce6ca37275b474b9ecff6950f6ca84502753691308b24a

                  SHA512

                  7b9bdc9e3ed366b9337f934146ba973e0ab25c77160014314562dec15542310cbd75c49a95397a4bf4ecd698c6f385a9f4898d8fe95e0f308b724793feca4b53

                • C:\Users\Admin\AppData\Roaming\BattlyLauncher\Network\Network Persistent State

                  Filesize

                  2KB

                  MD5

                  f0c80229d5cd28feb84bb173516bac19

                  SHA1

                  0d679c8313f9490409baeb36e41b84e804ba1b32

                  SHA256

                  438c278b12ee59c7e9c273727da7fcf915bc2840b04ec3e12e93c3925947c78e

                  SHA512

                  22118fadaa9f9c303940af6137a69477d4cda10549756883f48611fd9f59d6dbc2d1764596874d2dddb95ed2f3ac567c8a689b9292f75cd7db15954c69d71fee

                • C:\Users\Admin\AppData\Roaming\BattlyLauncher\Network\Network Persistent State~RFe5919d7.TMP

                  Filesize

                  59B

                  MD5

                  2800881c775077e1c4b6e06bf4676de4

                  SHA1

                  2873631068c8b3b9495638c865915be822442c8b

                  SHA256

                  226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

                  SHA512

                  e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

                • C:\Users\Admin\AppData\Roaming\BattlyLauncher\Preferences

                  Filesize

                  57B

                  MD5

                  58127c59cb9e1da127904c341d15372b

                  SHA1

                  62445484661d8036ce9788baeaba31d204e9a5fc

                  SHA256

                  be4b8924ab38e8acf350e6e3b9f1f63a1a94952d8002759acd6946c4d5d0b5de

                  SHA512

                  8d1815b277a93ad590ff79b6f52c576cf920c38c4353c24193f707d66884c942f39ff3989530055d2fade540ade243b41b6eb03cd0cc361c3b5d514cca28b50a

                • C:\Users\Admin\AppData\Roaming\BattlyLauncher\Preferences~RFe58317b.TMP

                  Filesize

                  86B

                  MD5

                  d11dedf80b85d8d9be3fec6bb292f64b

                  SHA1

                  aab8783454819cd66ddf7871e887abdba138aef3

                  SHA256

                  8029940de92ae596278912bbbd6387d65f4e849d3c136287a1233f525d189c67

                  SHA512

                  6b7ec1ca5189124e0d136f561ca7f12a4653633e2d9452d290e658dfe545acf6600cc9496794757a43f95c91705e9549ef681d4cc9e035738b03a18bdc2e25f0

                • C:\Users\Admin\AppData\Roaming\BattlyLauncher\Session Storage\CURRENT

                  Filesize

                  16B

                  MD5

                  46295cac801e5d4857d09837238a6394

                  SHA1

                  44e0fa1b517dbf802b18faf0785eeea6ac51594b

                  SHA256

                  0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                  SHA512

                  8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                • C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.exc

                  Filesize

                  2B

                  MD5

                  f3b25701fe362ec84616a93a45ce9998

                  SHA1

                  d62636d8caec13f04e28442a0a6fa1afeb024bbb

                  SHA256

                  b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                  SHA512

                  98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

                • memory/976-160-0x000000000F620000-0x000000000F621000-memory.dmp

                  Filesize

                  4KB

                • memory/976-158-0x000000000F620000-0x000000000F621000-memory.dmp

                  Filesize

                  4KB

                • memory/976-156-0x000000000F620000-0x000000000F621000-memory.dmp

                  Filesize

                  4KB

                • memory/976-154-0x000000000F620000-0x000000000F621000-memory.dmp

                  Filesize

                  4KB

                • memory/976-152-0x000000000F620000-0x000000000F621000-memory.dmp

                  Filesize

                  4KB

                • memory/976-150-0x000000000F620000-0x000000000F621000-memory.dmp

                  Filesize

                  4KB

                • memory/976-148-0x000000000F620000-0x000000000F621000-memory.dmp

                  Filesize

                  4KB

                • memory/3088-143-0x0000000010EC0000-0x0000000010EC1000-memory.dmp

                  Filesize

                  4KB

                • memory/3088-138-0x0000000010EC0000-0x0000000010EC1000-memory.dmp

                  Filesize

                  4KB

                • memory/3088-145-0x0000000010EC0000-0x0000000010EC1000-memory.dmp

                  Filesize

                  4KB

                • memory/3088-141-0x0000000010EC0000-0x0000000010EC1000-memory.dmp

                  Filesize

                  4KB

                • memory/3088-149-0x0000000010EC0000-0x0000000010EC1000-memory.dmp

                  Filesize

                  4KB

                • memory/3088-140-0x0000000010EC0000-0x0000000010EC1000-memory.dmp

                  Filesize

                  4KB

                • memory/3088-151-0x0000000010EC0000-0x0000000010EC1000-memory.dmp

                  Filesize

                  4KB

                • memory/3088-139-0x0000000010EC0000-0x0000000010EC1000-memory.dmp

                  Filesize

                  4KB

                • memory/3088-153-0x0000000010EC0000-0x0000000010EC1000-memory.dmp

                  Filesize

                  4KB

                • memory/3088-142-0x0000000010EC0000-0x0000000010EC1000-memory.dmp

                  Filesize

                  4KB

                • memory/3088-155-0x0000000010EC0000-0x0000000010EC1000-memory.dmp

                  Filesize

                  4KB

                • memory/3088-137-0x0000000010EC0000-0x0000000010EC1000-memory.dmp

                  Filesize

                  4KB

                • memory/3088-157-0x0000000010EC0000-0x0000000010EC1000-memory.dmp

                  Filesize

                  4KB

                • memory/3088-136-0x0000000010EC0000-0x0000000010EC1000-memory.dmp

                  Filesize

                  4KB

                • memory/3088-159-0x0000000010EC0000-0x0000000010EC1000-memory.dmp

                  Filesize

                  4KB

                • memory/3088-135-0x0000000010EC0000-0x0000000010EC1000-memory.dmp

                  Filesize

                  4KB

                • memory/3088-129-0x0000000010DE0000-0x0000000010DE1000-memory.dmp

                  Filesize

                  4KB

                • memory/3088-131-0x0000000010DE0000-0x0000000010DE1000-memory.dmp

                  Filesize

                  4KB

                • memory/3088-130-0x0000000010DE0000-0x0000000010DE1000-memory.dmp

                  Filesize

                  4KB