Overview
overview
10Static
static
7BLTools v2...FS.dll
windows7-x64
1BLTools v2...FS.dll
windows10-2004-x64
1BLTools v2...O].exe
windows7-x64
7BLTools v2...O].exe
windows10-2004-x64
10BLTools v2...or.exe
windows7-x64
3BLTools v2...or.exe
windows10-2004-x64
3BLTools v2...et.dll
windows7-x64
1BLTools v2...et.dll
windows10-2004-x64
1BLTools v2...se.dll
windows7-x64
1BLTools v2...se.dll
windows10-2004-x64
1BLTools v2...rs.dll
windows7-x64
1BLTools v2...rs.dll
windows10-2004-x64
1BLTools v2...pf.dll
windows7-x64
1BLTools v2...pf.dll
windows10-2004-x64
1BLTools v2...rs.dll
windows7-x64
1BLTools v2...rs.dll
windows10-2004-x64
1BLTools v2...pf.dll
windows7-x64
1BLTools v2...pf.dll
windows10-2004-x64
1BLTools v2...nce.js
windows7-x64
3BLTools v2...nce.js
windows10-2004-x64
BLTools v2...s/t.py
windows7-x64
3BLTools v2...s/t.py
windows10-2004-x64
3BLTools v2...uru.js
windows7-x64
3BLTools v2...uru.js
windows10-2004-x64
3BLTools v2...osk.js
windows7-x64
3BLTools v2...osk.js
windows10-2004-x64
3Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/02/2025, 01:03
Behavioral task
behavioral1
Sample
BLTools v2.9 [PRO]/AlphaFS.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
BLTools v2.9 [PRO]/AlphaFS.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral3
Sample
BLTools v2.9 [PRO]/BLTools v2.9 [PRO].exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
BLTools v2.9 [PRO]/BLTools v2.9 [PRO].exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral5
Sample
BLTools v2.9 [PRO]/CookiesCreator.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
BLTools v2.9 [PRO]/CookiesCreator.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral7
Sample
BLTools v2.9 [PRO]/Extreme.Net.dll
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
BLTools v2.9 [PRO]/Extreme.Net.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral9
Sample
BLTools v2.9 [PRO]/License.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
BLTools v2.9 [PRO]/License.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral11
Sample
BLTools v2.9 [PRO]/MaterialDesignColors.dll
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
BLTools v2.9 [PRO]/MaterialDesignColors.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral13
Sample
BLTools v2.9 [PRO]/MaterialDesignThemes.Wpf.dll
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
BLTools v2.9 [PRO]/MaterialDesignThemes.Wpf.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral15
Sample
BLTools v2.9 [PRO]/Microsoft.Xaml.Behaviors.dll
Resource
win7-20241023-en
Behavioral task
behavioral16
Sample
BLTools v2.9 [PRO]/Microsoft.Xaml.Behaviors.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral17
Sample
BLTools v2.9 [PRO]/Ookii.Dialogs.Wpf.dll
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
BLTools v2.9 [PRO]/Ookii.Dialogs.Wpf.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral19
Sample
BLTools v2.9 [PRO]/Projects/Gumroad Balance.js
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
BLTools v2.9 [PRO]/Projects/Gumroad Balance.js
Resource
win10v2004-20250129-en
Behavioral task
behavioral21
Sample
BLTools v2.9 [PRO]/Projects/t.py
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
BLTools v2.9 [PRO]/Projects/t.py
Resource
win10v2004-20250129-en
Behavioral task
behavioral23
Sample
BLTools v2.9 [PRO]/Projects/zelenka.guru.js
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
BLTools v2.9 [PRO]/Projects/zelenka.guru.js
Resource
win10v2004-20250129-en
Behavioral task
behavioral25
Sample
BLTools v2.9 [PRO]/Projects/zoosk.js
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
BLTools v2.9 [PRO]/Projects/zoosk.js
Resource
win10v2004-20250129-en
General
-
Target
BLTools v2.9 [PRO]/Projects/t.py
-
Size
197B
-
MD5
d466828dc96429d33cf79378e7df5bc7
-
SHA1
7af5c310cf51f6d35fa10db7da4b6f027df1dfd6
-
SHA256
33d03833858548c5c447cd74cc285acce2cf9f09bf340f9013bfac80cf20c180
-
SHA512
c85d1fd1122b5594c928d0f178d8624e151dab871978f85790c7facf62d2b3c093932c500fe38bae5b72ea251c8000d4d783543b9978d8e85f0cd4b4d6cca4a6
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2780 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2780 AcroRd32.exe 2780 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2140 2324 cmd.exe 31 PID 2324 wrote to memory of 2140 2324 cmd.exe 31 PID 2324 wrote to memory of 2140 2324 cmd.exe 31 PID 2140 wrote to memory of 2780 2140 rundll32.exe 32 PID 2140 wrote to memory of 2780 2140 rundll32.exe 32 PID 2140 wrote to memory of 2780 2140 rundll32.exe 32 PID 2140 wrote to memory of 2780 2140 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\BLTools v2.9 [PRO]\Projects\t.py"1⤵
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\BLTools v2.9 [PRO]\Projects\t.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\BLTools v2.9 [PRO]\Projects\t.py"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2780
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5f7e3402f87518a6bb28af66072b14462
SHA135e13ec83feb0e6b35d948073242ef6a65e32735
SHA25657e1fe6b97b233410d39b4c39e1630d6b64b0ab13691b41750cc1d92e15961ab
SHA512849e227d3c8852552d79c0f48a89c6bbcd27d064ae8774dfca45510f66abb449af7d2036d81716b463201cf0627494ce1ed514d2e92bc260f6580476f4bd1262