Analysis
-
max time kernel
39s -
max time network
40s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
18/12/2022, 13:03
Static task
static1
Behavioral task
behavioral1
Sample
BlitzedGrabberV12.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral2
Sample
Resources/UltraEmbeddable.exe
Resource
win10v2004-20221111-en
General
-
Target
BlitzedGrabberV12.exe
-
Size
4.9MB
-
MD5
c0183c980180cf92b8e97147ba0d03a3
-
SHA1
76d3a0dfefdb3ccae572456dda604901975fcd4f
-
SHA256
43ffd2c3994e283df7cf249b1a7355f45466f60457dc7756b05d5cda7cf73b00
-
SHA512
bc6caddb6bdcc14876612d0b059edadabc280e6ad2c6df3dacfa366e99ddb61425970bcddc5d29d5aed9480808e1dc855eaf36e026a9d3c6570b6b6ab7c85ba7
-
SSDEEP
98304:y+49wi73fWclJFwyqVDUjBJkqGTZj8Vu3Bjjd8oJ1jz0n:yR/jfz7ayqVDUjBJBG6o3BmoJ1a
Malware Config
Extracted
asyncrat
1.0.7
Default
37.19.210.29:60371
Microsoft_Supportinstall
-
delay
1
-
install
true
-
install_file
FrontEnd.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 26 IoCs
resource yara_rule behavioral1/memory/4228-153-0x0000000000F90000-0x00000000017A8000-memory.dmp asyncrat behavioral1/memory/4956-155-0x0000000000F90000-0x00000000017A8000-memory.dmp asyncrat behavioral1/memory/4956-157-0x0000000000F90000-0x00000000017A8000-memory.dmp asyncrat behavioral1/memory/4228-156-0x0000000000F90000-0x00000000017A8000-memory.dmp asyncrat behavioral1/memory/1396-164-0x0000000000F90000-0x00000000017A8000-memory.dmp asyncrat behavioral1/memory/1396-165-0x0000000000F90000-0x00000000017A8000-memory.dmp asyncrat behavioral1/memory/3316-173-0x0000000000F90000-0x00000000017A8000-memory.dmp asyncrat behavioral1/memory/3316-174-0x0000000000F90000-0x00000000017A8000-memory.dmp asyncrat behavioral1/memory/2900-183-0x0000000000F90000-0x00000000017A8000-memory.dmp asyncrat behavioral1/memory/2900-185-0x0000000000F90000-0x00000000017A8000-memory.dmp asyncrat behavioral1/memory/2548-193-0x0000000000F90000-0x00000000017A8000-memory.dmp asyncrat behavioral1/memory/4956-192-0x0000000000F90000-0x00000000017A8000-memory.dmp asyncrat behavioral1/memory/2548-196-0x0000000000F90000-0x00000000017A8000-memory.dmp asyncrat behavioral1/memory/1396-203-0x0000000000F90000-0x00000000017A8000-memory.dmp asyncrat behavioral1/memory/3384-207-0x0000000000F90000-0x00000000017A8000-memory.dmp asyncrat behavioral1/memory/3384-209-0x0000000000F90000-0x00000000017A8000-memory.dmp asyncrat behavioral1/memory/3316-212-0x0000000000F90000-0x00000000017A8000-memory.dmp asyncrat behavioral1/memory/4540-218-0x0000000000F90000-0x00000000017A8000-memory.dmp asyncrat behavioral1/memory/4540-219-0x0000000000F90000-0x00000000017A8000-memory.dmp asyncrat behavioral1/memory/2900-224-0x0000000000F90000-0x00000000017A8000-memory.dmp asyncrat behavioral1/memory/2660-230-0x0000000000F90000-0x00000000017A8000-memory.dmp asyncrat behavioral1/memory/2548-235-0x0000000000F90000-0x00000000017A8000-memory.dmp asyncrat behavioral1/memory/2660-232-0x0000000000F90000-0x00000000017A8000-memory.dmp asyncrat behavioral1/memory/3648-245-0x0000000000F90000-0x00000000017A8000-memory.dmp asyncrat behavioral1/memory/3648-242-0x0000000000F90000-0x00000000017A8000-memory.dmp asyncrat behavioral1/memory/3384-247-0x0000000000F90000-0x00000000017A8000-memory.dmp asyncrat -
Executes dropped EXE 1 IoCs
pid Process 4956 FRONTEND.EXE -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe -
resource yara_rule behavioral1/files/0x000600000002316a-134.dat themida behavioral1/files/0x000600000002316a-135.dat themida behavioral1/files/0x000600000002316a-138.dat themida behavioral1/files/0x000600000002316a-144.dat themida behavioral1/memory/4228-153-0x0000000000F90000-0x00000000017A8000-memory.dmp themida behavioral1/files/0x000600000002316a-154.dat themida behavioral1/memory/4956-155-0x0000000000F90000-0x00000000017A8000-memory.dmp themida behavioral1/memory/4956-157-0x0000000000F90000-0x00000000017A8000-memory.dmp themida behavioral1/memory/4228-156-0x0000000000F90000-0x00000000017A8000-memory.dmp themida behavioral1/files/0x000600000002316a-162.dat themida behavioral1/memory/1396-164-0x0000000000F90000-0x00000000017A8000-memory.dmp themida behavioral1/memory/1396-165-0x0000000000F90000-0x00000000017A8000-memory.dmp themida behavioral1/files/0x000600000002316a-171.dat themida behavioral1/memory/3316-173-0x0000000000F90000-0x00000000017A8000-memory.dmp themida behavioral1/memory/3316-174-0x0000000000F90000-0x00000000017A8000-memory.dmp themida behavioral1/files/0x000600000002316a-181.dat themida behavioral1/memory/2900-183-0x0000000000F90000-0x00000000017A8000-memory.dmp themida behavioral1/memory/2900-185-0x0000000000F90000-0x00000000017A8000-memory.dmp themida behavioral1/files/0x000600000002316a-188.dat themida behavioral1/memory/2548-193-0x0000000000F90000-0x00000000017A8000-memory.dmp themida behavioral1/memory/4956-192-0x0000000000F90000-0x00000000017A8000-memory.dmp themida behavioral1/memory/2548-196-0x0000000000F90000-0x00000000017A8000-memory.dmp themida behavioral1/memory/1396-203-0x0000000000F90000-0x00000000017A8000-memory.dmp themida behavioral1/files/0x000600000002316a-201.dat themida behavioral1/memory/3384-207-0x0000000000F90000-0x00000000017A8000-memory.dmp themida behavioral1/memory/3384-209-0x0000000000F90000-0x00000000017A8000-memory.dmp themida behavioral1/memory/3316-212-0x0000000000F90000-0x00000000017A8000-memory.dmp themida behavioral1/files/0x000600000002316a-217.dat themida behavioral1/memory/4540-218-0x0000000000F90000-0x00000000017A8000-memory.dmp themida behavioral1/memory/4540-219-0x0000000000F90000-0x00000000017A8000-memory.dmp themida behavioral1/memory/2900-224-0x0000000000F90000-0x00000000017A8000-memory.dmp themida behavioral1/files/0x000600000002316a-227.dat themida behavioral1/memory/2660-230-0x0000000000F90000-0x00000000017A8000-memory.dmp themida behavioral1/memory/2548-235-0x0000000000F90000-0x00000000017A8000-memory.dmp themida behavioral1/files/0x000600000002316a-238.dat themida behavioral1/memory/2660-232-0x0000000000F90000-0x00000000017A8000-memory.dmp themida behavioral1/memory/3648-245-0x0000000000F90000-0x00000000017A8000-memory.dmp themida behavioral1/memory/3648-242-0x0000000000F90000-0x00000000017A8000-memory.dmp themida behavioral1/memory/3384-247-0x0000000000F90000-0x00000000017A8000-memory.dmp themida behavioral1/files/0x000600000002316a-250.dat themida -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4144 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1132 wrote to memory of 5096 1132 BlitzedGrabberV12.exe 80 PID 1132 wrote to memory of 5096 1132 BlitzedGrabberV12.exe 80 PID 1132 wrote to memory of 5096 1132 BlitzedGrabberV12.exe 80 PID 1132 wrote to memory of 4956 1132 BlitzedGrabberV12.exe 81 PID 1132 wrote to memory of 4956 1132 BlitzedGrabberV12.exe 81 PID 1132 wrote to memory of 4956 1132 BlitzedGrabberV12.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"2⤵PID:5096
-
C:\Users\Admin\AppData\Local\Temp\FRONTEND.EXE"C:\Users\Admin\AppData\Local\Temp\FRONTEND.EXE"3⤵PID:4228
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "FrontEnd" /tr '"C:\Users\Admin\AppData\Roaming\FrontEnd.exe"' & exit4⤵PID:2108
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "FrontEnd" /tr '"C:\Users\Admin\AppData\Roaming\FrontEnd.exe"'5⤵
- Creates scheduled task(s)
PID:4144
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"3⤵PID:4288
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"4⤵PID:912
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"5⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"6⤵PID:1316
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"7⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"8⤵PID:3696
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"9⤵PID:3712
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"10⤵PID:932
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"11⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"12⤵PID:688
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"13⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"14⤵PID:4108
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"15⤵PID:4876
-
-
C:\Users\Admin\AppData\Local\Temp\FRONTEND.EXE"C:\Users\Admin\AppData\Local\Temp\FRONTEND.EXE"15⤵PID:2232
-
-
-
C:\Users\Admin\AppData\Local\Temp\FRONTEND.EXE"C:\Users\Admin\AppData\Local\Temp\FRONTEND.EXE"14⤵PID:1676
-
-
-
C:\Users\Admin\AppData\Local\Temp\FRONTEND.EXE"C:\Users\Admin\AppData\Local\Temp\FRONTEND.EXE"13⤵PID:3720
-
-
-
C:\Users\Admin\AppData\Local\Temp\FRONTEND.EXE"C:\Users\Admin\AppData\Local\Temp\FRONTEND.EXE"12⤵PID:3648
-
-
-
C:\Users\Admin\AppData\Local\Temp\FRONTEND.EXE"C:\Users\Admin\AppData\Local\Temp\FRONTEND.EXE"11⤵PID:2660
-
-
-
C:\Users\Admin\AppData\Local\Temp\FRONTEND.EXE"C:\Users\Admin\AppData\Local\Temp\FRONTEND.EXE"10⤵PID:4540
-
-
-
C:\Users\Admin\AppData\Local\Temp\FRONTEND.EXE"C:\Users\Admin\AppData\Local\Temp\FRONTEND.EXE"9⤵PID:3384
-
-
-
C:\Users\Admin\AppData\Local\Temp\FRONTEND.EXE"C:\Users\Admin\AppData\Local\Temp\FRONTEND.EXE"8⤵PID:2548
-
-
-
C:\Users\Admin\AppData\Local\Temp\FRONTEND.EXE"C:\Users\Admin\AppData\Local\Temp\FRONTEND.EXE"7⤵PID:2900
-
-
-
C:\Users\Admin\AppData\Local\Temp\FRONTEND.EXE"C:\Users\Admin\AppData\Local\Temp\FRONTEND.EXE"6⤵PID:3316
-
-
-
C:\Users\Admin\AppData\Local\Temp\FRONTEND.EXE"C:\Users\Admin\AppData\Local\Temp\FRONTEND.EXE"5⤵PID:1396
-
-
-
C:\Users\Admin\AppData\Local\Temp\FRONTEND.EXE"C:\Users\Admin\AppData\Local\Temp\FRONTEND.EXE"4⤵PID:1836
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\FRONTEND.EXE"C:\Users\Admin\AppData\Local\Temp\FRONTEND.EXE"2⤵
- Executes dropped EXE
PID:4956
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
3.0MB
MD551c086d2d9f2250e46d935d14c1184f4
SHA1536a99201606659b28417f49ee811d45354ced99
SHA256ae8b594f77991ac8d47091e5e520de9b582badd762889a4b2d268cee2b3422b7
SHA5126eeeef3bb30f95cead6f9bf670067f2bd561a60d3e12fe32ac24a8df337dac78f0e565a3032a9471bb2a71e065d26fb22da227c6aa4701a686985113ae918780
-
Filesize
3.0MB
MD551c086d2d9f2250e46d935d14c1184f4
SHA1536a99201606659b28417f49ee811d45354ced99
SHA256ae8b594f77991ac8d47091e5e520de9b582badd762889a4b2d268cee2b3422b7
SHA5126eeeef3bb30f95cead6f9bf670067f2bd561a60d3e12fe32ac24a8df337dac78f0e565a3032a9471bb2a71e065d26fb22da227c6aa4701a686985113ae918780
-
Filesize
3.0MB
MD551c086d2d9f2250e46d935d14c1184f4
SHA1536a99201606659b28417f49ee811d45354ced99
SHA256ae8b594f77991ac8d47091e5e520de9b582badd762889a4b2d268cee2b3422b7
SHA5126eeeef3bb30f95cead6f9bf670067f2bd561a60d3e12fe32ac24a8df337dac78f0e565a3032a9471bb2a71e065d26fb22da227c6aa4701a686985113ae918780
-
Filesize
3.0MB
MD551c086d2d9f2250e46d935d14c1184f4
SHA1536a99201606659b28417f49ee811d45354ced99
SHA256ae8b594f77991ac8d47091e5e520de9b582badd762889a4b2d268cee2b3422b7
SHA5126eeeef3bb30f95cead6f9bf670067f2bd561a60d3e12fe32ac24a8df337dac78f0e565a3032a9471bb2a71e065d26fb22da227c6aa4701a686985113ae918780
-
Filesize
3.0MB
MD551c086d2d9f2250e46d935d14c1184f4
SHA1536a99201606659b28417f49ee811d45354ced99
SHA256ae8b594f77991ac8d47091e5e520de9b582badd762889a4b2d268cee2b3422b7
SHA5126eeeef3bb30f95cead6f9bf670067f2bd561a60d3e12fe32ac24a8df337dac78f0e565a3032a9471bb2a71e065d26fb22da227c6aa4701a686985113ae918780
-
Filesize
3.0MB
MD551c086d2d9f2250e46d935d14c1184f4
SHA1536a99201606659b28417f49ee811d45354ced99
SHA256ae8b594f77991ac8d47091e5e520de9b582badd762889a4b2d268cee2b3422b7
SHA5126eeeef3bb30f95cead6f9bf670067f2bd561a60d3e12fe32ac24a8df337dac78f0e565a3032a9471bb2a71e065d26fb22da227c6aa4701a686985113ae918780
-
Filesize
3.0MB
MD551c086d2d9f2250e46d935d14c1184f4
SHA1536a99201606659b28417f49ee811d45354ced99
SHA256ae8b594f77991ac8d47091e5e520de9b582badd762889a4b2d268cee2b3422b7
SHA5126eeeef3bb30f95cead6f9bf670067f2bd561a60d3e12fe32ac24a8df337dac78f0e565a3032a9471bb2a71e065d26fb22da227c6aa4701a686985113ae918780
-
Filesize
3.0MB
MD551c086d2d9f2250e46d935d14c1184f4
SHA1536a99201606659b28417f49ee811d45354ced99
SHA256ae8b594f77991ac8d47091e5e520de9b582badd762889a4b2d268cee2b3422b7
SHA5126eeeef3bb30f95cead6f9bf670067f2bd561a60d3e12fe32ac24a8df337dac78f0e565a3032a9471bb2a71e065d26fb22da227c6aa4701a686985113ae918780
-
Filesize
3.0MB
MD551c086d2d9f2250e46d935d14c1184f4
SHA1536a99201606659b28417f49ee811d45354ced99
SHA256ae8b594f77991ac8d47091e5e520de9b582badd762889a4b2d268cee2b3422b7
SHA5126eeeef3bb30f95cead6f9bf670067f2bd561a60d3e12fe32ac24a8df337dac78f0e565a3032a9471bb2a71e065d26fb22da227c6aa4701a686985113ae918780
-
Filesize
3.0MB
MD551c086d2d9f2250e46d935d14c1184f4
SHA1536a99201606659b28417f49ee811d45354ced99
SHA256ae8b594f77991ac8d47091e5e520de9b582badd762889a4b2d268cee2b3422b7
SHA5126eeeef3bb30f95cead6f9bf670067f2bd561a60d3e12fe32ac24a8df337dac78f0e565a3032a9471bb2a71e065d26fb22da227c6aa4701a686985113ae918780
-
Filesize
3.0MB
MD551c086d2d9f2250e46d935d14c1184f4
SHA1536a99201606659b28417f49ee811d45354ced99
SHA256ae8b594f77991ac8d47091e5e520de9b582badd762889a4b2d268cee2b3422b7
SHA5126eeeef3bb30f95cead6f9bf670067f2bd561a60d3e12fe32ac24a8df337dac78f0e565a3032a9471bb2a71e065d26fb22da227c6aa4701a686985113ae918780
-
Filesize
2.5MB
MD59fa3e628a352782ff695b55e205b3a9b
SHA1fdac039d03e03b806c9ae10353a35a6516fbe2c7
SHA256e1e7c89aa31abe0472d0d11385c817fd572d4aaa2d76cab990e4bd7caa843e90
SHA512d1cfc0fdcbea82ef1bd6d6026f9939e8d57b0c18371b8e29e2342f999835d89a2c44a0b0ffa6463504806ffec6a188e8c9d6c558634b9b1bc393fce4cb9144be
-
Filesize
1.8MB
MD5eb5d71e1883919dd9ac5ca5ea3beaeb1
SHA19ef83af88e433a4c949aa50d03fae7f2dfb8324e
SHA256cafd96f6fb290df028739b283cf5675bfa62069adc882c3f68e96e50a42d8e66
SHA5126cdee39debcfc94ca89929bbe2f025c22b273503c0dba95d49637813ca53c722fc7fc4b37e8c8bf6e32ef18f22dc58815f7cb01ad58d60d75f0679c74e1fb917
-
Filesize
704KB
MD5a68c5de505e8081472794815aad6e79c
SHA1bbe8cd3b986529497929d865181737c2b12d8722
SHA2567094d19cf4fdfaa45d8452b2e5178b2d2bf86ac08ca31652d1ad8a6cf377bc76
SHA51218fe5a2de70d9ef2af283b5c17dbdb6fed10d17f18fcd2e44835aac0318dbc4f7bf82588c49a7e4274fabe6a8b3c0f772d85068a81c3ca346d8bb583228d1806