Analysis
-
max time kernel
132s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-05-2023 07:02
Static task
static1
Behavioral task
behavioral1
Sample
BlitzedGrabberV12.exe
Resource
win10v2004-20230220-en
General
-
Target
BlitzedGrabberV12.exe
-
Size
1.6MB
-
MD5
228a69dc15032fd0fb7100ff8561185e
-
SHA1
f8dbc89fed8078da7f306cb78b92ce04a0bdeb00
-
SHA256
920bec9d500f6446b84399ab4c84858d0f0d7d1abb2e0377399ebbc4bafad709
-
SHA512
373621c4743fa72571b3c8375aa6f7852303a821558b016b002d2af07154787d978f66696db89eeed8fe41f4aed5d66b690d4f87469939f9b1dea2ac2b9101f1
-
SSDEEP
24576:xxAskWeOT4n5lLHxnpL2Q/NLmKgDJ68p4C8BsePDigEoXh7O83igweBAWgt:PAznU4n9t2ELj18p4BDifoM83ig9Ap
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 904 BlitzedGrabberV12.exe -
Obfuscated with Agile.Net obfuscator 32 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral1/memory/904-145-0x0000000005830000-0x0000000005A1E000-memory.dmp agile_net behavioral1/memory/904-146-0x0000000005830000-0x0000000005A1E000-memory.dmp agile_net behavioral1/memory/904-148-0x0000000005830000-0x0000000005A1E000-memory.dmp agile_net behavioral1/memory/904-151-0x0000000005830000-0x0000000005A1E000-memory.dmp agile_net behavioral1/memory/904-154-0x0000000005830000-0x0000000005A1E000-memory.dmp agile_net behavioral1/memory/904-156-0x0000000005830000-0x0000000005A1E000-memory.dmp agile_net behavioral1/memory/904-158-0x0000000005830000-0x0000000005A1E000-memory.dmp agile_net behavioral1/memory/904-160-0x0000000005830000-0x0000000005A1E000-memory.dmp agile_net behavioral1/memory/904-162-0x0000000005830000-0x0000000005A1E000-memory.dmp agile_net behavioral1/memory/904-164-0x0000000005830000-0x0000000005A1E000-memory.dmp agile_net behavioral1/memory/904-166-0x0000000005830000-0x0000000005A1E000-memory.dmp agile_net behavioral1/memory/904-168-0x0000000005830000-0x0000000005A1E000-memory.dmp agile_net behavioral1/memory/904-170-0x0000000005830000-0x0000000005A1E000-memory.dmp agile_net behavioral1/memory/904-172-0x0000000005830000-0x0000000005A1E000-memory.dmp agile_net behavioral1/memory/904-174-0x0000000005830000-0x0000000005A1E000-memory.dmp agile_net behavioral1/memory/904-176-0x0000000005830000-0x0000000005A1E000-memory.dmp agile_net behavioral1/memory/904-178-0x0000000005830000-0x0000000005A1E000-memory.dmp agile_net behavioral1/memory/904-180-0x0000000005830000-0x0000000005A1E000-memory.dmp agile_net behavioral1/memory/904-182-0x0000000005830000-0x0000000005A1E000-memory.dmp agile_net behavioral1/memory/904-184-0x0000000005830000-0x0000000005A1E000-memory.dmp agile_net behavioral1/memory/904-186-0x0000000005830000-0x0000000005A1E000-memory.dmp agile_net behavioral1/memory/904-188-0x0000000005830000-0x0000000005A1E000-memory.dmp agile_net behavioral1/memory/904-190-0x0000000005830000-0x0000000005A1E000-memory.dmp agile_net behavioral1/memory/904-192-0x0000000005830000-0x0000000005A1E000-memory.dmp agile_net behavioral1/memory/904-194-0x0000000005830000-0x0000000005A1E000-memory.dmp agile_net behavioral1/memory/904-196-0x0000000005830000-0x0000000005A1E000-memory.dmp agile_net behavioral1/memory/904-198-0x0000000005830000-0x0000000005A1E000-memory.dmp agile_net behavioral1/memory/904-200-0x0000000005830000-0x0000000005A1E000-memory.dmp agile_net behavioral1/memory/904-202-0x0000000005830000-0x0000000005A1E000-memory.dmp agile_net behavioral1/memory/904-204-0x0000000005830000-0x0000000005A1E000-memory.dmp agile_net behavioral1/memory/904-206-0x0000000005830000-0x0000000005A1E000-memory.dmp agile_net behavioral1/memory/904-208-0x0000000005830000-0x0000000005A1E000-memory.dmp agile_net -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 904 BlitzedGrabberV12.exe 904 BlitzedGrabberV12.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD59af5eb006bb0bab7f226272d82c896c7
SHA1c2a5bb42a5f08f4dc821be374b700652262308f0
SHA25677dc05a6bda90757f66552ee3f469b09f1e00732b4edca0f542872fb591ed9db
SHA5127badd41be4c1039302fda9bba19d374ec9446ce24b7db33b66bee4ef38180d1abcd666d2aea468e7e452aa1e1565eedfefed582bf1c2fe477a4171d99d48772a
-
Filesize
136KB
MD59af5eb006bb0bab7f226272d82c896c7
SHA1c2a5bb42a5f08f4dc821be374b700652262308f0
SHA25677dc05a6bda90757f66552ee3f469b09f1e00732b4edca0f542872fb591ed9db
SHA5127badd41be4c1039302fda9bba19d374ec9446ce24b7db33b66bee4ef38180d1abcd666d2aea468e7e452aa1e1565eedfefed582bf1c2fe477a4171d99d48772a