Analysis

  • max time kernel
    14s
  • max time network
    15s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-11-2024 09:29

General

  • Target

    BLTools v2.9 [PRO].exe

  • Size

    7.1MB

  • MD5

    bef86c9792f7f8bc658ca1d1bce63c60

  • SHA1

    d7d3fe3ae1e950cd4192d46a0bf6505ec3858689

  • SHA256

    2ebfc2838c33ff2fc3547369bf0e8bcdfe41c245ede9241602f44afbf7c3cfdb

  • SHA512

    6ec05fa9bd6ab5c8f1aaa323c81d9f8ae5905a9dba4c511a57c473f568fa551115442ac325547beaecb5c9813446689be37e0485a8fa78f03bf9e82386a93de7

  • SSDEEP

    98304:LinmCgeyQbyt5fTQ7lN7jGb5XQueha05FK7Km53t/VXCRjwsRMJnq2ISUMRlEGy:L0/UVQ7D+b56ha07K7KettcVFcIG

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\BLTools v2.9 [PRO].exe
    "C:\Users\Admin\AppData\Local\Temp\BLTools v2.9 [PRO].exe"
    1⤵
    • Enumerates connected drives
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:4164

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\sensfiles.zip

    Filesize

    151KB

    MD5

    97acb32d345d16f043668f0f415da1a2

    SHA1

    5cacf3b9ab22ac31f31e91cd7c2f8c1f3b1b7a4b

    SHA256

    aa2ec767a23e82828f12c3bab2c5dff88016476312cb780d73b0687d9662d396

    SHA512

    d4ce64099bc6188eb46499e1bb96fcc84f4dfcf3dfa62d5318e551e3bbe25f3753f2fc7c8bcb4fa607500cb6210978bdc00335bca880e1bdec645ece7d6b62ed

  • memory/4164-0-0x00007FF69F880000-0x00007FF69FBF4000-memory.dmp

    Filesize

    3.5MB

  • memory/4164-2-0x00007FFD56240000-0x00007FFD56242000-memory.dmp

    Filesize

    8KB

  • memory/4164-1-0x00007FFD56230000-0x00007FFD56232000-memory.dmp

    Filesize

    8KB

  • memory/4164-7-0x00007FF69F440000-0x00007FF6A0312000-memory.dmp

    Filesize

    14.8MB

  • memory/4164-10-0x00007FF69F880000-0x00007FF69FBF4000-memory.dmp

    Filesize

    3.5MB

  • memory/4164-11-0x00007FF69F440000-0x00007FF6A0312000-memory.dmp

    Filesize

    14.8MB

  • memory/4164-57-0x00007FF69F880000-0x00007FF69FBF4000-memory.dmp

    Filesize

    3.5MB

  • memory/4164-58-0x00007FF69F440000-0x00007FF6A0312000-memory.dmp

    Filesize

    14.8MB