Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2023, 18:33
Static task
static1
Behavioral task
behavioral1
Sample
BlitzedGrabberV12.exe
Resource
win10-20230915-en
Behavioral task
behavioral2
Sample
BlitzedGrabberV12.exe
Resource
win10v2004-20230915-en
General
-
Target
BlitzedGrabberV12.exe
-
Size
1.6MB
-
MD5
228a69dc15032fd0fb7100ff8561185e
-
SHA1
f8dbc89fed8078da7f306cb78b92ce04a0bdeb00
-
SHA256
920bec9d500f6446b84399ab4c84858d0f0d7d1abb2e0377399ebbc4bafad709
-
SHA512
373621c4743fa72571b3c8375aa6f7852303a821558b016b002d2af07154787d978f66696db89eeed8fe41f4aed5d66b690d4f87469939f9b1dea2ac2b9101f1
-
SSDEEP
24576:xxAskWeOT4n5lLHxnpL2Q/NLmKgDJ68p4C8BsePDigEoXh7O83igweBAWgt:PAznU4n9t2ELj18p4BDifoM83ig9Ap
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 3648 BlitzedGrabberV12.exe -
Obfuscated with Agile.Net obfuscator 33 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral2/memory/3648-6-0x0000000005310000-0x0000000005502000-memory.dmp agile_net behavioral2/memory/3648-16-0x0000000005310000-0x00000000054FE000-memory.dmp agile_net behavioral2/memory/3648-17-0x0000000005310000-0x00000000054FE000-memory.dmp agile_net behavioral2/memory/3648-19-0x0000000005310000-0x00000000054FE000-memory.dmp agile_net behavioral2/memory/3648-21-0x0000000005310000-0x00000000054FE000-memory.dmp agile_net behavioral2/memory/3648-23-0x0000000005310000-0x00000000054FE000-memory.dmp agile_net behavioral2/memory/3648-25-0x0000000005310000-0x00000000054FE000-memory.dmp agile_net behavioral2/memory/3648-27-0x0000000005310000-0x00000000054FE000-memory.dmp agile_net behavioral2/memory/3648-29-0x0000000005310000-0x00000000054FE000-memory.dmp agile_net behavioral2/memory/3648-31-0x0000000005310000-0x00000000054FE000-memory.dmp agile_net behavioral2/memory/3648-33-0x0000000005310000-0x00000000054FE000-memory.dmp agile_net behavioral2/memory/3648-35-0x0000000005310000-0x00000000054FE000-memory.dmp agile_net behavioral2/memory/3648-37-0x0000000005310000-0x00000000054FE000-memory.dmp agile_net behavioral2/memory/3648-39-0x0000000005310000-0x00000000054FE000-memory.dmp agile_net behavioral2/memory/3648-41-0x0000000005310000-0x00000000054FE000-memory.dmp agile_net behavioral2/memory/3648-43-0x0000000005310000-0x00000000054FE000-memory.dmp agile_net behavioral2/memory/3648-45-0x0000000005310000-0x00000000054FE000-memory.dmp agile_net behavioral2/memory/3648-47-0x0000000005310000-0x00000000054FE000-memory.dmp agile_net behavioral2/memory/3648-49-0x0000000005310000-0x00000000054FE000-memory.dmp agile_net behavioral2/memory/3648-51-0x0000000005310000-0x00000000054FE000-memory.dmp agile_net behavioral2/memory/3648-53-0x0000000005310000-0x00000000054FE000-memory.dmp agile_net behavioral2/memory/3648-55-0x0000000005310000-0x00000000054FE000-memory.dmp agile_net behavioral2/memory/3648-57-0x0000000005310000-0x00000000054FE000-memory.dmp agile_net behavioral2/memory/3648-59-0x0000000005310000-0x00000000054FE000-memory.dmp agile_net behavioral2/memory/3648-61-0x0000000005310000-0x00000000054FE000-memory.dmp agile_net behavioral2/memory/3648-63-0x0000000005310000-0x00000000054FE000-memory.dmp agile_net behavioral2/memory/3648-65-0x0000000005310000-0x00000000054FE000-memory.dmp agile_net behavioral2/memory/3648-67-0x0000000005310000-0x00000000054FE000-memory.dmp agile_net behavioral2/memory/3648-69-0x0000000005310000-0x00000000054FE000-memory.dmp agile_net behavioral2/memory/3648-71-0x0000000005310000-0x00000000054FE000-memory.dmp agile_net behavioral2/memory/3648-73-0x0000000005310000-0x00000000054FE000-memory.dmp agile_net behavioral2/memory/3648-75-0x0000000005310000-0x00000000054FE000-memory.dmp agile_net behavioral2/memory/3648-77-0x0000000005310000-0x00000000054FE000-memory.dmp agile_net
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD59af5eb006bb0bab7f226272d82c896c7
SHA1c2a5bb42a5f08f4dc821be374b700652262308f0
SHA25677dc05a6bda90757f66552ee3f469b09f1e00732b4edca0f542872fb591ed9db
SHA5127badd41be4c1039302fda9bba19d374ec9446ce24b7db33b66bee4ef38180d1abcd666d2aea468e7e452aa1e1565eedfefed582bf1c2fe477a4171d99d48772a
-
Filesize
136KB
MD59af5eb006bb0bab7f226272d82c896c7
SHA1c2a5bb42a5f08f4dc821be374b700652262308f0
SHA25677dc05a6bda90757f66552ee3f469b09f1e00732b4edca0f542872fb591ed9db
SHA5127badd41be4c1039302fda9bba19d374ec9446ce24b7db33b66bee4ef38180d1abcd666d2aea468e7e452aa1e1565eedfefed582bf1c2fe477a4171d99d48772a