Overview
overview
10Static
static
10APIFOR.dll
windows7-x64
1APIFOR.dll
windows10-2004-x64
1BlitzedGrabberV14.exe
windows7-x64
10BlitzedGrabberV14.exe
windows10-2004-x64
10BlitzedGrabberV14.pdb
windows7-x64
3BlitzedGrabberV14.pdb
windows10-2004-x64
3Costura.dll
windows7-x64
1Costura.dll
windows10-2004-x64
1DiscordRPC.dll
windows7-x64
1DiscordRPC.dll
windows10-2004-x64
1Guna.UI2.dll
windows7-x64
1Guna.UI2.dll
windows10-2004-x64
1Newtonsoft.Json.dll
windows7-x64
1Newtonsoft.Json.dll
windows10-2004-x64
1Sodium.dll
windows7-x64
1Sodium.dll
windows10-2004-x64
1System.Dia...ce.dll
windows7-x64
1System.Dia...ce.dll
windows10-2004-x64
1Vestris.Re...ib.dll
windows7-x64
1Vestris.Re...ib.dll
windows10-2004-x64
1dnlib.dll
windows7-x64
1dnlib.dll
windows10-2004-x64
1libsodium-64.dll
windows7-x64
1libsodium-64.dll
windows10-2004-x64
1libsodium.dll
windows7-x64
1libsodium.dll
windows10-2004-x64
1Analysis
-
max time kernel
82s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 11:47
Behavioral task
behavioral1
Sample
APIFOR.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
APIFOR.dll
Resource
win10v2004-20230221-en
Behavioral task
behavioral3
Sample
BlitzedGrabberV14.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
BlitzedGrabberV14.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
BlitzedGrabberV14.pdb
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
BlitzedGrabberV14.pdb
Resource
win10v2004-20230221-en
Behavioral task
behavioral7
Sample
Costura.dll
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
Costura.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
DiscordRPC.dll
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
DiscordRPC.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
Guna.UI2.dll
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
Guna.UI2.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
Newtonsoft.Json.dll
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
Newtonsoft.Json.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral15
Sample
Sodium.dll
Resource
win7-20230220-en
Behavioral task
behavioral16
Sample
Sodium.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral17
Sample
System.Diagnostics.DiagnosticSource.dll
Resource
win7-20230220-en
Behavioral task
behavioral18
Sample
System.Diagnostics.DiagnosticSource.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral19
Sample
Vestris.ResourceLib.dll
Resource
win7-20230220-en
Behavioral task
behavioral20
Sample
Vestris.ResourceLib.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral21
Sample
dnlib.dll
Resource
win7-20230220-en
Behavioral task
behavioral22
Sample
dnlib.dll
Resource
win10v2004-20230221-en
Behavioral task
behavioral23
Sample
libsodium-64.dll
Resource
win7-20230220-en
Behavioral task
behavioral24
Sample
libsodium-64.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral25
Sample
libsodium.dll
Resource
win7-20230220-en
Behavioral task
behavioral26
Sample
libsodium.dll
Resource
win10v2004-20230220-en
General
-
Target
BlitzedGrabberV14.pdb
-
Size
69KB
-
MD5
5bd44240d711b107c17aa2915973dda1
-
SHA1
35389922775faf582f0141344407ee502f92bede
-
SHA256
c9c5dea39b8af57a992c993f4964d746ab3245903c443e17152b1606a46d0994
-
SHA512
2a2a73b51f25aef70a9971a07b0e9cf12ad45fc3048652fea06106c286b58cd35fae9cd606045f230d361702f289adab81bfb071928220300b2179bfb18e13b6
-
SSDEEP
768:lS0w1V6uLzbPmf9NsIBVUGHqzXHJCVOxE/mNcd:lS0gscrm1WMCGa36
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
Processes:
cmd.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
OpenWith.exepid process 1256 OpenWith.exe