Overview
overview
3Static
static
1OTP BY Blazee (1).zip
windows7-x64
1OTP BY Blazee (1).zip
windows10-2004-x64
1OTP BY Bla...g.json
windows7-x64
3OTP BY Bla...g.json
windows10-2004-x64
3OTP BY Bla...s.json
windows7-x64
3OTP BY Bla...s.json
windows10-2004-x64
3OTP BY Bla...10.pyc
windows7-x64
3OTP BY Bla...10.pyc
windows10-2004-x64
3OTP BY Bla...11.pyc
windows7-x64
3OTP BY Bla...11.pyc
windows10-2004-x64
3OTP BY Bla...39.pyc
windows7-x64
3OTP BY Bla...39.pyc
windows10-2004-x64
3OTP BY Bla...10.pyc
windows7-x64
3OTP BY Bla...10.pyc
windows10-2004-x64
3OTP BY Bla...11.pyc
windows7-x64
3OTP BY Bla...11.pyc
windows10-2004-x64
3OTP BY Bla...39.pyc
windows7-x64
3OTP BY Bla...39.pyc
windows10-2004-x64
3OTP BY Bla...ost.py
windows7-x64
3OTP BY Bla...ost.py
windows10-2004-x64
3OTP BY Bla...ost.py
windows7-x64
3OTP BY Bla...ost.py
windows10-2004-x64
3OTP BY Bla...g.json
windows7-x64
3OTP BY Bla...g.json
windows10-2004-x64
3OTP BY Bla...ll.bat
windows7-x64
1OTP BY Bla...ll.bat
windows10-2004-x64
1OTP BY Bla...ain.py
windows7-x64
3OTP BY Bla...ain.py
windows10-2004-x64
3OTP BY Bla...dme.md
windows7-x64
3OTP BY Bla...dme.md
windows10-2004-x64
3OTP BY Bla...rt.bat
windows7-x64
1OTP BY Bla...rt.bat
windows10-2004-x64
1Analysis
-
max time kernel
103s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
14-10-2024 17:14
Static task
static1
Behavioral task
behavioral1
Sample
OTP BY Blazee (1).zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
OTP BY Blazee (1).zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
OTP BY Blazee/OTP BOT BY SYNDICATE.rar/config.json
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
OTP BY Blazee/OTP BOT BY SYNDICATE.rar/config.json
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
OTP BY Blazee/OTP BOT BY SYNDICATE.rar/fprints.json
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
OTP BY Blazee/OTP BOT BY SYNDICATE.rar/fprints.json
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
OTP BY Blazee/OTP BOT BY SYNDICATE.rar/helpers/__pycache__/automated_boost.cpython-310.pyc
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
OTP BY Blazee/OTP BOT BY SYNDICATE.rar/helpers/__pycache__/automated_boost.cpython-310.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
OTP BY Blazee/OTP BOT BY SYNDICATE.rar/helpers/__pycache__/automated_boost.cpython-311.pyc
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
OTP BY Blazee/OTP BOT BY SYNDICATE.rar/helpers/__pycache__/automated_boost.cpython-311.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
OTP BY Blazee/OTP BOT BY SYNDICATE.rar/helpers/__pycache__/automated_boost.cpython-39.pyc
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
OTP BY Blazee/OTP BOT BY SYNDICATE.rar/helpers/__pycache__/automated_boost.cpython-39.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
OTP BY Blazee/OTP BOT BY SYNDICATE.rar/helpers/__pycache__/boost.cpython-310.pyc
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
OTP BY Blazee/OTP BOT BY SYNDICATE.rar/helpers/__pycache__/boost.cpython-310.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
OTP BY Blazee/OTP BOT BY SYNDICATE.rar/helpers/__pycache__/boost.cpython-311.pyc
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
OTP BY Blazee/OTP BOT BY SYNDICATE.rar/helpers/__pycache__/boost.cpython-311.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
OTP BY Blazee/OTP BOT BY SYNDICATE.rar/helpers/__pycache__/boost.cpython-39.pyc
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
OTP BY Blazee/OTP BOT BY SYNDICATE.rar/helpers/__pycache__/boost.cpython-39.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
OTP BY Blazee/OTP BOT BY SYNDICATE.rar/helpers/automated_boost.py
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
OTP BY Blazee/OTP BOT BY SYNDICATE.rar/helpers/automated_boost.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
OTP BY Blazee/OTP BOT BY SYNDICATE.rar/helpers/boost.py
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
OTP BY Blazee/OTP BOT BY SYNDICATE.rar/helpers/boost.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
OTP BY Blazee/OTP BOT BY SYNDICATE.rar/helpers/config.json
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
OTP BY Blazee/OTP BOT BY SYNDICATE.rar/helpers/config.json
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
OTP BY Blazee/OTP BOT BY SYNDICATE.rar/install.bat
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
OTP BY Blazee/OTP BOT BY SYNDICATE.rar/install.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
OTP BY Blazee/OTP BOT BY SYNDICATE.rar/main.py
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
OTP BY Blazee/OTP BOT BY SYNDICATE.rar/main.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
OTP BY Blazee/OTP BOT BY SYNDICATE.rar/readme.md
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
OTP BY Blazee/OTP BOT BY SYNDICATE.rar/readme.md
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
OTP BY Blazee/OTP BOT BY SYNDICATE.rar/start.bat
Resource
win7-20240729-en
Behavioral task
behavioral32
Sample
OTP BY Blazee/OTP BOT BY SYNDICATE.rar/start.bat
Resource
win10v2004-20241007-en
General
-
Target
OTP BY Blazee/OTP BOT BY SYNDICATE.rar/helpers/config.json
-
Size
334B
-
MD5
770138a3c4d28e7f5c3384f11ff518d6
-
SHA1
67ac1b3b387bac40c1b57624adcb1b6072b4aeb5
-
SHA256
1d7699dee8cf5dceacf805641983f3056ce951563eca2ec5f42247c75279b615
-
SHA512
0698b4562df2fc7b225df66dede685c7a953caeb72e882297db0ac235637d768736e4271d4da4e6584a7436240251ece3b328995296d49dce0077b66fb9b99b5
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2976 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2976 AcroRd32.exe 2976 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2736 wrote to memory of 3008 2736 cmd.exe 31 PID 2736 wrote to memory of 3008 2736 cmd.exe 31 PID 2736 wrote to memory of 3008 2736 cmd.exe 31 PID 3008 wrote to memory of 2976 3008 rundll32.exe 32 PID 3008 wrote to memory of 2976 3008 rundll32.exe 32 PID 3008 wrote to memory of 2976 3008 rundll32.exe 32 PID 3008 wrote to memory of 2976 3008 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\OTP BY Blazee\OTP BOT BY SYNDICATE.rar\helpers\config.json"1⤵
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\OTP BY Blazee\OTP BOT BY SYNDICATE.rar\helpers\config.json2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\OTP BY Blazee\OTP BOT BY SYNDICATE.rar\helpers\config.json"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2976
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD529d82720a993b44766af8d14a736dda0
SHA16f9d244603fede62e73c79d8e766c9071bf116ce
SHA256f3a6b429297d52c2f34311a1c6fd2b80e2047438aa29384c3d8ddee75495f7b9
SHA5122d39c6336a33ad0a28a85db9ffc2b67409cced4b59db8b08f330da45e88906415c322b3d912c685a39e1a53b1e6d864d59de01c59d7fbbdb29470a1d47249a48