Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19-02-2024 18:20
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
BLTools_2.7.2.rar
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
BLTools_2.7.2.rar
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
BLTools_2.7.2.rar
-
Size
4.0MB
-
MD5
f25ff3f57954e45b183c516f4766eac9
-
SHA1
a117380962af408a151f6a121b66137b939fd019
-
SHA256
a5df5a78c02e5e113bf908574b2544a0d95180fee058de4dacad63262a9670c5
-
SHA512
179e45decf6a1139ca93412c2c7a66cbe08a0382c6a8cdc081e7c02ba8464294581e00532e4ff335f7135fd708ee4fa1cb34c49a2bf4c3bedbbd76e7f79f84cd
-
SSDEEP
98304:9RJcMBm/nklu58DTPJ1eIJl7xiiIE6C9UfrK3tiwsjl:h6kluM97NOTitizl
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2828 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 2828 7zFM.exe Token: 35 2828 7zFM.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2828 7zFM.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1888 wrote to memory of 2828 1888 cmd.exe 29 PID 1888 wrote to memory of 2828 1888 cmd.exe 29 PID 1888 wrote to memory of 2828 1888 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\BLTools_2.7.2.rar1⤵
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\BLTools_2.7.2.rar"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2828
-