Overview
overview
10Static
static
10BlitzedPrem.7z
windows7-x64
3BlitzedPrem.7z
windows10-2004-x64
3APIFOR.dll
windows7-x64
1APIFOR.dll
windows10-2004-x64
1BlitzedGrabberV14.exe
windows7-x64
10BlitzedGrabberV14.exe
windows10-2004-x64
10BlitzedGrabberV14.pdb
windows7-x64
3BlitzedGrabberV14.pdb
windows10-2004-x64
3Costura.dll
windows7-x64
1Costura.dll
windows10-2004-x64
1DiscordRPC.dll
windows7-x64
1DiscordRPC.dll
windows10-2004-x64
1Guna.UI2.dll
windows7-x64
1Guna.UI2.dll
windows10-2004-x64
1Newtonsoft.Json.dll
windows7-x64
1Newtonsoft.Json.dll
windows10-2004-x64
1Sodium.dll
windows7-x64
1Sodium.dll
windows10-2004-x64
1System.Dia...ce.dll
windows7-x64
1System.Dia...ce.dll
windows10-2004-x64
1Vestris.Re...ib.dll
windows7-x64
1Vestris.Re...ib.dll
windows10-2004-x64
1dnlib.dll
windows7-x64
1dnlib.dll
windows10-2004-x64
1libsodium-64.dll
windows7-x64
1libsodium-64.dll
windows10-2004-x64
1libsodium.dll
windows7-x64
1libsodium.dll
windows10-2004-x64
1Analysis
-
max time kernel
150s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
23-04-2023 15:14
Behavioral task
behavioral1
Sample
BlitzedPrem.7z
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
BlitzedPrem.7z
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
APIFOR.dll
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
APIFOR.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
BlitzedGrabberV14.exe
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
BlitzedGrabberV14.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
BlitzedGrabberV14.pdb
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
BlitzedGrabberV14.pdb
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
Costura.dll
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
Costura.dll
Resource
win10v2004-20230221-en
Behavioral task
behavioral11
Sample
DiscordRPC.dll
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
DiscordRPC.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
Guna.UI2.dll
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
Guna.UI2.dll
Resource
win10v2004-20230221-en
Behavioral task
behavioral15
Sample
Newtonsoft.Json.dll
Resource
win7-20230220-en
Behavioral task
behavioral16
Sample
Newtonsoft.Json.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral17
Sample
Sodium.dll
Resource
win7-20230220-en
Behavioral task
behavioral18
Sample
Sodium.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral19
Sample
System.Diagnostics.DiagnosticSource.dll
Resource
win7-20230220-en
Behavioral task
behavioral20
Sample
System.Diagnostics.DiagnosticSource.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral21
Sample
Vestris.ResourceLib.dll
Resource
win7-20230220-en
Behavioral task
behavioral22
Sample
Vestris.ResourceLib.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral23
Sample
dnlib.dll
Resource
win7-20230220-en
Behavioral task
behavioral24
Sample
dnlib.dll
Resource
win10v2004-20230221-en
Behavioral task
behavioral25
Sample
libsodium-64.dll
Resource
win7-20230220-en
Behavioral task
behavioral26
Sample
libsodium-64.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral27
Sample
libsodium.dll
Resource
win7-20230220-en
Behavioral task
behavioral28
Sample
libsodium.dll
Resource
win10v2004-20230220-en
General
-
Target
BlitzedGrabberV14.pdb
-
Size
69KB
-
MD5
5bd44240d711b107c17aa2915973dda1
-
SHA1
35389922775faf582f0141344407ee502f92bede
-
SHA256
c9c5dea39b8af57a992c993f4964d746ab3245903c443e17152b1606a46d0994
-
SHA512
2a2a73b51f25aef70a9971a07b0e9cf12ad45fc3048652fea06106c286b58cd35fae9cd606045f230d361702f289adab81bfb071928220300b2179bfb18e13b6
-
SSDEEP
768:lS0w1V6uLzbPmf9NsIBVUGHqzXHJCVOxE/mNcd:lS0gscrm1WMCGa36
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\pdb_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\.pdb rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\.pdb\ = "pdb_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\pdb_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\pdb_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\pdb_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\pdb_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\pdb_auto_file\ rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
AcroRd32.exepid process 1452 AcroRd32.exe 1452 AcroRd32.exe 1452 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 2008 wrote to memory of 472 2008 cmd.exe rundll32.exe PID 2008 wrote to memory of 472 2008 cmd.exe rundll32.exe PID 2008 wrote to memory of 472 2008 cmd.exe rundll32.exe PID 472 wrote to memory of 1452 472 rundll32.exe AcroRd32.exe PID 472 wrote to memory of 1452 472 rundll32.exe AcroRd32.exe PID 472 wrote to memory of 1452 472 rundll32.exe AcroRd32.exe PID 472 wrote to memory of 1452 472 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV14.pdb1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV14.pdb2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV14.pdb"3⤵
- Suspicious use of SetWindowsHookEx