Analysis
-
max time kernel
135s -
max time network
116s -
platform
windows10_x64 -
resource
win10 -
submitted
19-07-2020 19:43
Static task
static1
Behavioral task
behavioral1
Sample
grabbot_0.1.6.8.vir.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
grabbot_0.1.6.8.vir.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
grabbot_0.1.6.8.vir.exe
-
Size
548KB
-
MD5
be69aea7aa08096ad0cb2efa623a9917
-
SHA1
2fb758c34566152131f4124e230e135812247258
-
SHA256
04af2427e4e229d16c7c3bde0898b09abea9625bdd22f6a229a9d0bf0c6d57c5
-
SHA512
1c4cf8bb0150d8ae1cfcab8e914a25bc6b0ae210648e6ba7c3d00e02a3ca961b513694c29827de9090697decc4435b55060bd0a563fb7df417ac59a1bed62bcc
Score
7/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
grabbot_0.1.6.8.vir.exedescription pid process target process PID 2976 wrote to memory of 2988 2976 grabbot_0.1.6.8.vir.exe Explorer.EXE PID 2976 wrote to memory of 2988 2976 grabbot_0.1.6.8.vir.exe Explorer.EXE PID 2976 wrote to memory of 2988 2976 grabbot_0.1.6.8.vir.exe Explorer.EXE -
Deletes itself 1 IoCs
Processes:
Explorer.EXEpid process 2988 Explorer.EXE -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Explorer.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Run\{18BD5B68-C8C0-9A00-3000-7B9B7AB1F3} = "\"C:\\Users\\Admin\\AppData\\Roaming\\{18BD5B68-C8C0-9A00-3000-7B9B7AB1F3}\\fkpqvwcdin.exe\"" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Run Explorer.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 15 IoCs
Processes:
grabbot_0.1.6.8.vir.exeExplorer.EXEpid process 2976 grabbot_0.1.6.8.vir.exe 2976 grabbot_0.1.6.8.vir.exe 2976 grabbot_0.1.6.8.vir.exe 2976 grabbot_0.1.6.8.vir.exe 2976 grabbot_0.1.6.8.vir.exe 2976 grabbot_0.1.6.8.vir.exe 2988 Explorer.EXE 2988 Explorer.EXE 2988 Explorer.EXE 2988 Explorer.EXE 2988 Explorer.EXE 2988 Explorer.EXE 2988 Explorer.EXE 2988 Explorer.EXE 2988 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 9 IoCs
Processes:
grabbot_0.1.6.8.vir.exeExplorer.EXEdescription pid process Token: SeSecurityPrivilege 2976 grabbot_0.1.6.8.vir.exe Token: SeSecurityPrivilege 2988 Explorer.EXE Token: SeSecurityPrivilege 2988 Explorer.EXE Token: SeSecurityPrivilege 2988 Explorer.EXE Token: SeSecurityPrivilege 2988 Explorer.EXE Token: SeShutdownPrivilege 2988 Explorer.EXE Token: SeCreatePagefilePrivilege 2988 Explorer.EXE Token: SeShutdownPrivilege 2988 Explorer.EXE Token: SeCreatePagefilePrivilege 2988 Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Deletes itself
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\grabbot_0.1.6.8.vir.exe"C:\Users\Admin\AppData\Local\Temp\grabbot_0.1.6.8.vir.exe"2⤵
- Suspicious use of WriteProcessMemory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken