Overview
overview
10Static
static
10Battly-Lau...al.exe
windows7-x64
7Battly-Lau...al.exe
windows10-2004-x64
10$PLUGINSDI...ge.dll
windows7-x64
3$PLUGINSDI...ge.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...sh.bmp
windows7-x64
3$PLUGINSDI...sh.bmp
windows10-2004-x64
7LICENSE.electron.txt
windows7-x64
1LICENSE.electron.txt
windows10-2004-x64
1chrome_100...nt.pak
windows7-x64
3chrome_100...nt.pak
windows10-2004-x64
3chrome_200...nt.pak
windows7-x64
3chrome_200...nt.pak
windows10-2004-x64
3resources/...ute.js
windows7-x64
3resources/...ute.js
windows10-2004-x64
3resources/...ICENSE
windows7-x64
1resources/...ICENSE
windows10-2004-x64
1resources/...DME.js
windows7-x64
3resources/...DME.js
windows10-2004-x64
3resources/...dex.js
windows7-x64
3resources/...dex.js
windows10-2004-x64
3resources/...dex.js
windows7-x64
3resources/...dex.js
windows10-2004-x64
3resources/...ICENSE
windows7-x64
1resources/...ICENSE
windows10-2004-x64
1resources/...ime.js
windows7-x64
3resources/...ime.js
windows10-2004-x64
3resources/...dex.js
windows7-x64
3resources/...dex.js
windows10-2004-x64
3resources/...ICENSE
windows7-x64
1resources/...ICENSE
windows10-2004-x64
1Analysis
-
max time kernel
425s -
max time network
440s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-es -
resource tags
arch:x64arch:x86image:win10v2004-20240802-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
20-09-2024 21:19
Behavioral task
behavioral1
Sample
Battly-Launcher-win Universal.exe
Resource
win7-20240903-es
Behavioral task
behavioral2
Sample
Battly-Launcher-win Universal.exe
Resource
win10v2004-20240802-es
Behavioral task
behavioral3
Sample
$PLUGINSDIR/BgImage.dll
Resource
win7-20240903-es
Behavioral task
behavioral4
Sample
$PLUGINSDIR/BgImage.dll
Resource
win10v2004-20240802-es
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-es
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-es
Behavioral task
behavioral7
Sample
$PLUGINSDIR/splash.bmp
Resource
win7-20240729-es
Behavioral task
behavioral8
Sample
$PLUGINSDIR/splash.bmp
Resource
win10v2004-20240802-es
Behavioral task
behavioral9
Sample
LICENSE.electron.txt
Resource
win7-20240903-es
Behavioral task
behavioral10
Sample
LICENSE.electron.txt
Resource
win10v2004-20240802-es
Behavioral task
behavioral11
Sample
chrome_100_percent.pak
Resource
win7-20240903-es
Behavioral task
behavioral12
Sample
chrome_100_percent.pak
Resource
win10v2004-20240802-es
Behavioral task
behavioral13
Sample
chrome_200_percent.pak
Resource
win7-20240708-es
Behavioral task
behavioral14
Sample
chrome_200_percent.pak
Resource
win10v2004-20240802-es
Behavioral task
behavioral15
Sample
resources/app/node_modules/color-convert/route.js
Resource
win7-20240708-es
Behavioral task
behavioral16
Sample
resources/app/node_modules/color-convert/route.js
Resource
win10v2004-20240802-es
Behavioral task
behavioral17
Sample
resources/app/node_modules/color-name/LICENSE
Resource
win7-20240903-es
Behavioral task
behavioral18
Sample
resources/app/node_modules/color-name/LICENSE
Resource
win10v2004-20240802-es
Behavioral task
behavioral19
Sample
resources/app/node_modules/concat-map/README.js
Resource
win7-20240729-es
Behavioral task
behavioral20
Sample
resources/app/node_modules/concat-map/README.js
Resource
win10v2004-20240802-es
Behavioral task
behavioral21
Sample
resources/app/node_modules/concat-map/index.js
Resource
win7-20240903-es
Behavioral task
behavioral22
Sample
resources/app/node_modules/concat-map/index.js
Resource
win10v2004-20240802-es
Behavioral task
behavioral23
Sample
resources/app/node_modules/ejs-electron/index.js
Resource
win7-20240708-es
Behavioral task
behavioral24
Sample
resources/app/node_modules/ejs-electron/index.js
Resource
win10v2004-20240802-es
Behavioral task
behavioral25
Sample
resources/app/node_modules/ejs-electron/node_modules/mime/LICENSE
Resource
win7-20240708-es
Behavioral task
behavioral26
Sample
resources/app/node_modules/ejs-electron/node_modules/mime/LICENSE
Resource
win10v2004-20240802-es
Behavioral task
behavioral27
Sample
resources/app/node_modules/ejs-electron/node_modules/mime/Mime.js
Resource
win7-20240903-es
Behavioral task
behavioral28
Sample
resources/app/node_modules/ejs-electron/node_modules/mime/Mime.js
Resource
win10v2004-20240802-es
Behavioral task
behavioral29
Sample
resources/app/node_modules/ejs-electron/node_modules/mime/index.js
Resource
win7-20240903-es
Behavioral task
behavioral30
Sample
resources/app/node_modules/ejs-electron/node_modules/mime/index.js
Resource
win10v2004-20240802-es
Behavioral task
behavioral31
Sample
resources/app/node_modules/ejs/LICENSE
Resource
win7-20240729-es
Behavioral task
behavioral32
Sample
resources/app/node_modules/ejs/LICENSE
Resource
win10v2004-20240802-es
General
-
Target
$PLUGINSDIR/splash.bmp
-
Size
411KB
-
MD5
53b029ccb83951c0f232fbcde874b403
-
SHA1
c6c57b8b7eac7c0f3b7ecff5d4b2a4c1de4d326f
-
SHA256
4a3a74bcc1da624c51860bf3dc2333230cad7c961414e015a987e204f6447461
-
SHA512
514d3e5e925ec16db2ab89d71b34c95ea76f5679dfc4fc2e759c0e982d08660b5ca9a76bbc814ed3335b461ac9e1bf82de2b88dc988f4378e3a974cd59485acb
-
SSDEEP
3072:Iy+VjIHJNBlLhK2mTBxTfFM+8GLa9V+16rGwQHS5LjgzlZkvZEFqKGO0jCC1jMrL:ejIHjnmVxTiheqksRQymRKvOwP9EL
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation cmd.exe -
Drops file in Windows directory 1 IoCs
Processes:
mspaint.exedescription ioc process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
cmd.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
mspaint.exepid process 3756 mspaint.exe 3756 mspaint.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
mspaint.exepid process 3756 mspaint.exe 3756 mspaint.exe 3756 mspaint.exe 3756 mspaint.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
cmd.exedescription pid process target process PID 3436 wrote to memory of 3756 3436 cmd.exe mspaint.exe PID 3436 wrote to memory of 3756 3436 cmd.exe mspaint.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\splash.bmp1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\splash.bmp"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3756
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:1292