Overview
overview
10Static
static
10BLTools v2...FS.dll
windows7-x64
1BLTools v2...FS.dll
windows10-2004-x64
1BLTools v2...RO.exe
windows7-x64
5BLTools v2...RO.exe
windows10-2004-x64
5BLTools v2...ls.exe
windows7-x64
7BLTools v2...ls.exe
windows10-2004-x64
7BLTools v2...or.exe
windows7-x64
7BLTools v2...or.exe
windows10-2004-x64
8BLTools v2...et.dll
windows7-x64
1BLTools v2...et.dll
windows10-2004-x64
1BLTools v2...se.dll
windows7-x64
1BLTools v2...se.dll
windows10-2004-x64
1BLTools v2...rs.dll
windows7-x64
1BLTools v2...rs.dll
windows10-2004-x64
1BLTools v2...pf.dll
windows7-x64
1BLTools v2...pf.dll
windows10-2004-x64
1BLTools v2...rs.dll
windows7-x64
1BLTools v2...rs.dll
windows10-2004-x64
1BLTools v2...pf.dll
windows7-x64
1BLTools v2...pf.dll
windows10-2004-x64
1BLTools v2...nce.js
windows7-x64
3BLTools v2...nce.js
windows10-2004-x64
3BLTools v2...uru.js
windows7-x64
3BLTools v2...uru.js
windows10-2004-x64
3BLTools v2...���.js
windows7-x64
3BLTools v2...���.js
windows10-2004-x64
3Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
25-10-2024 22:52
Behavioral task
behavioral1
Sample
BLTools v2.9 PRO/AlphaFS.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
BLTools v2.9 PRO/AlphaFS.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
BLTools v2.9 PRO/BLTools v2.9 PRO.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
BLTools v2.9 PRO/BLTools v2.9 PRO.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
BLTools v2.9 PRO/BLTools.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
BLTools v2.9 PRO/BLTools.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
BLTools v2.9 PRO/CookiesCreator.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
BLTools v2.9 PRO/CookiesCreator.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
BLTools v2.9 PRO/Extreme.Net.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
BLTools v2.9 PRO/Extreme.Net.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
BLTools v2.9 PRO/License.dll
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
BLTools v2.9 PRO/License.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
BLTools v2.9 PRO/MaterialDesignColors.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
BLTools v2.9 PRO/MaterialDesignColors.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
BLTools v2.9 PRO/MaterialDesignThemes.Wpf.dll
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
BLTools v2.9 PRO/MaterialDesignThemes.Wpf.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
BLTools v2.9 PRO/Microsoft.Xaml.Behaviors.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
BLTools v2.9 PRO/Microsoft.Xaml.Behaviors.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
BLTools v2.9 PRO/Ookii.Dialogs.Wpf.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
BLTools v2.9 PRO/Ookii.Dialogs.Wpf.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
BLTools v2.9 PRO/Projects/Gumroad Balance.js
Resource
win7-20241023-en
Behavioral task
behavioral22
Sample
BLTools v2.9 PRO/Projects/Gumroad Balance.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
BLTools v2.9 PRO/Projects/zelenka.guru.js
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
BLTools v2.9 PRO/Projects/zelenka.guru.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
BLTools v2.9 PRO/Projects/👁 itsnotZELENKA.GURU 👁.js
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
BLTools v2.9 PRO/Projects/👁 itsnotZELENKA.GURU 👁.js
Resource
win10v2004-20241007-en
General
-
Target
BLTools v2.9 PRO/BLTools.exe
-
Size
5.9MB
-
MD5
dfa8706c22679f73c12350c5ceef4be9
-
SHA1
786ebcc382749363d5bfe56dd3d9165b44abb2f3
-
SHA256
8c746b0086c9c1bd72a487ffa55bd896a949d89ae2f91a7aa7c6d5d6124b2510
-
SHA512
2654da238f67253ae96b6ade05e1d97d9debd6e0759daae23964809533d4d9c382b360202b3cd70caec97735034a54ee5a7ad7573eeb969e3185794cdf268a7d
-
SSDEEP
98304:1k05ee4lCP5rHvCQyYddIwF1OXvKqKQcj/zNktidLSChybf1sxPUeNh:H5e1QOdwF1OXvK1j/JkkLSwybSc
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2824 evb783D.tmp 2064 BLTools v2.9 PRO.exe -
Loads dropped DLL 1 IoCs
pid Process 1824 BLTools.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2064 BLTools v2.9 PRO.exe 2064 BLTools v2.9 PRO.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1824 set thread context of 2824 1824 BLTools.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLTools v2.9 PRO.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2824 evb783D.tmp 2824 evb783D.tmp 2824 evb783D.tmp 2824 evb783D.tmp 2824 evb783D.tmp -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1824 wrote to memory of 2824 1824 BLTools.exe 30 PID 1824 wrote to memory of 2824 1824 BLTools.exe 30 PID 1824 wrote to memory of 2824 1824 BLTools.exe 30 PID 1824 wrote to memory of 2824 1824 BLTools.exe 30 PID 1824 wrote to memory of 2824 1824 BLTools.exe 30 PID 1824 wrote to memory of 2824 1824 BLTools.exe 30 PID 1824 wrote to memory of 2824 1824 BLTools.exe 30 PID 1824 wrote to memory of 2824 1824 BLTools.exe 30 PID 1824 wrote to memory of 2824 1824 BLTools.exe 30 PID 1824 wrote to memory of 2824 1824 BLTools.exe 30 PID 1824 wrote to memory of 2824 1824 BLTools.exe 30 PID 1824 wrote to memory of 2824 1824 BLTools.exe 30 PID 1824 wrote to memory of 2824 1824 BLTools.exe 30 PID 1824 wrote to memory of 2824 1824 BLTools.exe 30 PID 1824 wrote to memory of 2824 1824 BLTools.exe 30 PID 1824 wrote to memory of 2824 1824 BLTools.exe 30 PID 1824 wrote to memory of 2824 1824 BLTools.exe 30 PID 1824 wrote to memory of 2824 1824 BLTools.exe 30 PID 1824 wrote to memory of 2064 1824 BLTools.exe 31 PID 1824 wrote to memory of 2064 1824 BLTools.exe 31 PID 1824 wrote to memory of 2064 1824 BLTools.exe 31 PID 1824 wrote to memory of 2064 1824 BLTools.exe 31 PID 2824 wrote to memory of 2104 2824 evb783D.tmp 32 PID 2824 wrote to memory of 2104 2824 evb783D.tmp 32 PID 2824 wrote to memory of 2104 2824 evb783D.tmp 32 PID 2824 wrote to memory of 2104 2824 evb783D.tmp 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\BLTools v2.9 PRO\BLTools.exe"C:\Users\Admin\AppData\Local\Temp\BLTools v2.9 PRO\BLTools.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\evb783D.tmp"C:\Users\Admin\AppData\Local\Temp\BLTools v2.9 PRO\cookies.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\system32\conhost.execonhost.exe3⤵PID:2104
-
-
-
C:\Users\Admin\AppData\Local\Temp\BLTools v2.9 PRO\BLTools v2.9 PRO.exe"C:\Users\Admin\AppData\Local\Temp\BLTools v2.9 PRO\BLTools v2.9 PRO.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b8152180651818ef0e382061760fae83
SHA15aa82224ab08cd413f39138ac5735d412b386d17
SHA256c1d8fa3babfd42de6cdb8a58ed9ab18ba420a5009e4702619441356cddc7ccf7
SHA51299dc032861e0d799ecdb457b4bf3ce5eb317c1b56f46c0457227b6bc425fd9019b8a4be4fb106c5e73c9c4b4b80e9ba79bc78502c98f0b1d34eab90a342f854b
-
Filesize
3.2MB
MD58c949c1a3189fc8845f22295ee72a150
SHA11df3585b887e077251008c68f233f128c08b0b74
SHA25653b6b47c5dbfbb8ea17990309e9549acc44d8b5d4b1c9e76ec754653f5d31870
SHA512b27d485b3cd4633edb245659c581458f20b67859f4e7d02205a68824d41dd216882989a807c01d5468e3f99beb78850fa7aeb217f7b8ac8ad30f3a652fc24066