Analysis
-
max time kernel
135s -
max time network
124s -
platform
windows7_x64 -
resource
win7 -
submitted
19-07-2020 19:43
Static task
static1
Behavioral task
behavioral1
Sample
grabbot_0.1.6.8.vir.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
grabbot_0.1.6.8.vir.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
grabbot_0.1.6.8.vir.exe
-
Size
548KB
-
MD5
be69aea7aa08096ad0cb2efa623a9917
-
SHA1
2fb758c34566152131f4124e230e135812247258
-
SHA256
04af2427e4e229d16c7c3bde0898b09abea9625bdd22f6a229a9d0bf0c6d57c5
-
SHA512
1c4cf8bb0150d8ae1cfcab8e914a25bc6b0ae210648e6ba7c3d00e02a3ca961b513694c29827de9090697decc4435b55060bd0a563fb7df417ac59a1bed62bcc
Score
7/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
grabbot_0.1.6.8.vir.exeExplorer.EXEpid process 1588 grabbot_0.1.6.8.vir.exe 1588 grabbot_0.1.6.8.vir.exe 1268 Explorer.EXE 1268 Explorer.EXE 1268 Explorer.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
grabbot_0.1.6.8.vir.exedescription pid process target process PID 1588 wrote to memory of 1268 1588 grabbot_0.1.6.8.vir.exe Explorer.EXE PID 1588 wrote to memory of 1268 1588 grabbot_0.1.6.8.vir.exe Explorer.EXE PID 1588 wrote to memory of 1268 1588 grabbot_0.1.6.8.vir.exe Explorer.EXE -
Deletes itself 1 IoCs
Processes:
Explorer.EXEpid process 1268 Explorer.EXE -
Suspicious use of FindShellTrayWindow 5 IoCs
Processes:
Explorer.EXEpid process 1268 Explorer.EXE 1268 Explorer.EXE 1268 Explorer.EXE 1268 Explorer.EXE 1268 Explorer.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
Explorer.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
grabbot_0.1.6.8.vir.exeExplorer.EXEdescription pid process Token: SeSecurityPrivilege 1588 grabbot_0.1.6.8.vir.exe Token: SeSecurityPrivilege 1268 Explorer.EXE Token: SeSecurityPrivilege 1268 Explorer.EXE Token: SeSecurityPrivilege 1268 Explorer.EXE Token: SeSecurityPrivilege 1268 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
Explorer.EXEpid process 1268 Explorer.EXE 1268 Explorer.EXE 1268 Explorer.EXE 1268 Explorer.EXE -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Explorer.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run\{2592B290-1380-2400-E000-86C099BDFE} = "\"C:\\Users\\Admin\\AppData\\Roaming\\{2592B290-1380-2400-E000-86C099BDFE}\\xyefklqvwc.exe\"" Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Deletes itself
- Suspicious use of FindShellTrayWindow
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SendNotifyMessage
- Adds Run key to start application
-
C:\Users\Admin\AppData\Local\Temp\grabbot_0.1.6.8.vir.exe"C:\Users\Admin\AppData\Local\Temp\grabbot_0.1.6.8.vir.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Suspicious use of AdjustPrivilegeToken