Analysis
-
max time kernel
150s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
09/10/2023, 19:16
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
btcgrabber.exe
Resource
win7-20230831-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
btcgrabber.exe
Resource
win10v2004-20230915-en
16 signatures
150 seconds
General
-
Target
btcgrabber.exe
-
Size
55KB
-
MD5
79052fe9b9e43bdfd8cee873e1c66e43
-
SHA1
7f3fedf08c2d9d96b2dfee286189f0bbc29cc7c1
-
SHA256
25280d7ffa3f96617808c9fa344ea6d359472cced5991a744425a216948d8b44
-
SHA512
c3da11b62d699a98f2b564ff4ac9b5abc38b0c5bd1314fecaeeea873410b8f52199cd64d722db4b197812a8496f4d027ef934afca209e9678dd4c595eea74cf2
-
SSDEEP
1536:KnI4x+Sgw7U8gHwZfggbX6ZujO0rUrWU:I/gfHwZfnbXXO0r1U
Score
7/10
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Update.lnk btcgrabber.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Update.lnk btcgrabber.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2896 btcgrabber.exe Token: SeDebugPrivilege 2896 btcgrabber.exe