Overview
overview
10Static
static
10Battly-Lau...ws.exe
windows7-x64
7Battly-Lau...ws.exe
windows10-2004-x64
7resources/...e.json
windows7-x64
3resources/...e.json
windows10-2004-x64
3resources/...e.json
windows7-x64
3resources/...e.json
windows10-2004-x64
3resources/...Me.txt
windows7-x64
1resources/...Me.txt
windows10-2004-x64
1resources/...e.json
windows7-x64
3resources/...e.json
windows10-2004-x64
3resources/...e.json
windows7-x64
3resources/...e.json
windows10-2004-x64
3resources/...ds.ejs
windows7-x64
3resources/...ds.ejs
windows10-2004-x64
3resources/...ex.css
windows7-x64
3resources/...ex.css
windows10-2004-x64
7resources/...n.icns
windows7-x64
3resources/...n.icns
windows10-2004-x64
3resources/...on.ico
windows7-x64
3resources/...on.ico
windows10-2004-x64
3resources/...on.png
windows7-x64
3resources/...on.png
windows10-2004-x64
3resources/...nd.png
windows7-x64
3resources/...nd.png
windows10-2004-x64
3resources/...ar.png
windows7-x64
3resources/...ar.png
windows10-2004-x64
3resources/...de.png
windows7-x64
3resources/...de.png
windows10-2004-x64
3resources/...en.png
windows7-x64
3resources/...en.png
windows10-2004-x64
3resources/...es.png
windows7-x64
3resources/...es.png
windows10-2004-x64
3Analysis
-
max time kernel
144s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-08-2024 21:13
Behavioral task
behavioral1
Sample
Battly-Launcher-Windows.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Battly-Launcher-Windows.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
resources/app/node_modules/color-name/package.json
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
resources/app/node_modules/color-name/package.json
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
resources/app/node_modules/protocol/package.json
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
resources/app/node_modules/protocol/package.json
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
resources/app/node_modules/windows-shortcuts/lib/shortcut/ReadMe.txt
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
resources/app/node_modules/windows-shortcuts/lib/shortcut/ReadMe.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
resources/app/node_modules/windows-shortcuts/package.json
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
resources/app/node_modules/windows-shortcuts/package.json
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
resources/app/package.json
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
resources/app/package.json
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
resources/app/src/ads.ejs
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
resources/app/src/ads.ejs
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
resources/app/src/assets/css/index.css
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
resources/app/src/assets/css/index.css
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
resources/app/src/assets/icon.icns
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
resources/app/src/assets/icon.icns
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
resources/app/src/assets/icon.ico
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
resources/app/src/assets/icon.ico
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
resources/app/src/assets/icon.png
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
resources/app/src/assets/icon.png
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
resources/app/src/assets/images/background.png
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
resources/app/src/assets/images/background.png
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
resources/app/src/assets/images/flags/ar.png
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
resources/app/src/assets/images/flags/ar.png
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
resources/app/src/assets/images/flags/de.png
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
resources/app/src/assets/images/flags/de.png
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
resources/app/src/assets/images/flags/en.png
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
resources/app/src/assets/images/flags/en.png
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
resources/app/src/assets/images/flags/es.png
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
resources/app/src/assets/images/flags/es.png
Resource
win10v2004-20240802-en
General
-
Target
resources/app/src/assets/css/index.css
-
Size
20KB
-
MD5
9338a403220d934986f5dc738419174d
-
SHA1
33d0a93608f28900b4771b49d88259b2f70350e7
-
SHA256
2f281d5eb03f52a46514089fd0b0af408f02613a8fcef8d506dc01f590651d7c
-
SHA512
cd92d15c6ee9d6d9ed78fa073406462d5f3b33cc9c198a693fa51f53889ba9f5ef2a498ea3f033ef7cad73b1248e4bad9afcad8246f5b98dcde3435399dca508
-
SSDEEP
192:zIPPOBM/UfNLh38L6wLLd949+cZaxYPrunqm0LJ4nqBDmwsNSflfBWG+ngBmb:UFUf7ML6hPrDz+KfBWtg0
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
cmd.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings cmd.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid Process 4984 NOTEPAD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
cmd.exedescription pid Process procid_target PID 1924 wrote to memory of 4984 1924 cmd.exe 85 PID 1924 wrote to memory of 4984 1924 cmd.exe 85
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\resources\app\src\assets\css\index.css1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\resources\app\src\assets\css\index.css2⤵
- Opens file in notepad (likely ransom note)
PID:4984
-