Analysis
-
max time kernel
449s -
max time network
451s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 04:03
Behavioral task
behavioral1
Sample
BLTools v2.7.2 Pro.exe
Resource
win7-20240221-en
2 signatures
600 seconds
Behavioral task
behavioral2
Sample
BLTools v2.7.2 Pro.exe
Resource
win10v2004-20240226-en
2 signatures
600 seconds
Behavioral task
behavioral3
Sample
CookiesCreator v1.2.exe
Resource
win7-20240221-en
6 signatures
600 seconds
General
-
Target
BLTools v2.7.2 Pro.exe
-
Size
3.4MB
-
MD5
b6accab723ca675c18544f2640cabce8
-
SHA1
066ee4ec9fe7eb3520543797878ba6b77148010f
-
SHA256
1ddbbe124a321ba8c769295cf91ed5a2ddfd4669da9f1bb95907a30120b1c2a1
-
SHA512
ec4797aad8f6250be0ac1903231c2f8eb1ec03b1650ba69b81df5fc9d80842ff8fbfebe8d25539f9c14fa2a898fff04965fe5748f01be90b4aadf869e7a5e0c2
-
SSDEEP
49152:VMByOj9Ss24R0wFhlMv6DSdsHXgzSq0Xll2JEW38Y2WUC:Vyj9Sl4R0wFrNDSGH8Kll2KWtjUC
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 5080 BLTools v2.7.2 Pro.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5080 BLTools v2.7.2 Pro.exe Token: SeManageVolumePrivilege 1784 svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\BLTools v2.7.2 Pro.exe"C:\Users\Admin\AppData\Local\Temp\BLTools v2.7.2 Pro.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5080
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:644
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1784