Overview
overview
8Static
static
8Rose-Grabb...er.bat
windows7-x64
1Rose-Grabb...er.bat
windows10-2004-x64
1Rose-Grabb...ion.js
windows7-x64
1Rose-Grabb...ion.js
windows10-2004-x64
1Rose-Grabb...ctX.py
windows7-x64
3Rose-Grabb...ctX.py
windows10-2004-x64
3Rose-Grabb...ile.py
windows7-x64
3Rose-Grabb...ile.py
windows10-2004-x64
3Rose-Grabb...ing.py
windows7-x64
3Rose-Grabb...ing.py
windows10-2004-x64
3Rose-Grabb...lox.py
windows7-x64
3Rose-Grabb...lox.py
windows10-2004-x64
3Rose-Grabb...tup.py
windows7-x64
3Rose-Grabb...tup.py
windows10-2004-x64
3Rose-Grabb...ook.py
windows7-x64
3Rose-Grabb...ook.py
windows10-2004-x64
3Rose-Grabb...ivm.py
windows7-x64
3Rose-Grabb...ivm.py
windows10-2004-x64
3Rose-Grabb...tes.py
windows7-x64
3Rose-Grabb...tes.py
windows10-2004-x64
3Rose-Grabb...ser.py
windows7-x64
3Rose-Grabb...ser.py
windows10-2004-x64
3Rose-Grabb...fig.py
windows7-x64
3Rose-Grabb...fig.py
windows10-2004-x64
3Rose-Grabb...ner.py
windows7-x64
3Rose-Grabb...ner.py
windows10-2004-x64
3Rose-Grabb...rdc.py
windows7-x64
3Rose-Grabb...rdc.py
windows10-2004-x64
3Rose-Grabb...are.py
windows7-x64
3Rose-Grabb...are.py
windows10-2004-x64
3Rose-Grabb...mes.py
windows7-x64
3Rose-Grabb...mes.py
windows10-2004-x64
3Analysis
-
max time kernel
82s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
17/11/2023, 03:05
Behavioral task
behavioral1
Sample
Rose-Grabber-main/builder.bat
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
Rose-Grabber-main/builder.bat
Resource
win10v2004-20231023-en
Behavioral task
behavioral3
Sample
Rose-Grabber-main/resources/data/injection.js
Resource
win7-20231020-en
Behavioral task
behavioral4
Sample
Rose-Grabber-main/resources/data/injection.js
Resource
win10v2004-20231020-en
Behavioral task
behavioral5
Sample
Rose-Grabber-main/resources/source/bin/InjectX.py
Resource
win7-20231020-en
Behavioral task
behavioral6
Sample
Rose-Grabber-main/resources/source/bin/InjectX.py
Resource
win10v2004-20231025-en
Behavioral task
behavioral7
Sample
Rose-Grabber-main/resources/source/bin/_file.py
Resource
win7-20231023-en
Behavioral task
behavioral8
Sample
Rose-Grabber-main/resources/source/bin/_file.py
Resource
win10v2004-20231023-en
Behavioral task
behavioral9
Sample
Rose-Grabber-main/resources/source/bin/_random_string.py
Resource
win7-20231020-en
Behavioral task
behavioral10
Sample
Rose-Grabber-main/resources/source/bin/_random_string.py
Resource
win10v2004-20231020-en
Behavioral task
behavioral11
Sample
Rose-Grabber-main/resources/source/bin/_roblox.py
Resource
win7-20231023-en
Behavioral task
behavioral12
Sample
Rose-Grabber-main/resources/source/bin/_roblox.py
Resource
win10v2004-20231023-en
Behavioral task
behavioral13
Sample
Rose-Grabber-main/resources/source/bin/_startup.py
Resource
win7-20231025-en
Behavioral task
behavioral14
Sample
Rose-Grabber-main/resources/source/bin/_startup.py
Resource
win10v2004-20231020-en
Behavioral task
behavioral15
Sample
Rose-Grabber-main/resources/source/bin/_webhook.py
Resource
win7-20231023-en
Behavioral task
behavioral16
Sample
Rose-Grabber-main/resources/source/bin/_webhook.py
Resource
win10v2004-20231023-en
Behavioral task
behavioral17
Sample
Rose-Grabber-main/resources/source/bin/antivm.py
Resource
win7-20231020-en
Behavioral task
behavioral18
Sample
Rose-Grabber-main/resources/source/bin/antivm.py
Resource
win10v2004-20231023-en
Behavioral task
behavioral19
Sample
Rose-Grabber-main/resources/source/bin/block_sites.py
Resource
win7-20231023-en
Behavioral task
behavioral20
Sample
Rose-Grabber-main/resources/source/bin/block_sites.py
Resource
win10v2004-20231020-en
Behavioral task
behavioral21
Sample
Rose-Grabber-main/resources/source/bin/browser.py
Resource
win7-20231020-en
Behavioral task
behavioral22
Sample
Rose-Grabber-main/resources/source/bin/browser.py
Resource
win10v2004-20231025-en
Behavioral task
behavioral23
Sample
Rose-Grabber-main/resources/source/bin/config.py
Resource
win7-20231023-en
Behavioral task
behavioral24
Sample
Rose-Grabber-main/resources/source/bin/config.py
Resource
win10v2004-20231023-en
Behavioral task
behavioral25
Sample
Rose-Grabber-main/resources/source/bin/crypto_miner.py
Resource
win7-20231025-en
Behavioral task
behavioral26
Sample
Rose-Grabber-main/resources/source/bin/crypto_miner.py
Resource
win10v2004-20231020-en
Behavioral task
behavioral27
Sample
Rose-Grabber-main/resources/source/bin/discordc.py
Resource
win7-20231020-en
Behavioral task
behavioral28
Sample
Rose-Grabber-main/resources/source/bin/discordc.py
Resource
win10v2004-20231020-en
Behavioral task
behavioral29
Sample
Rose-Grabber-main/resources/source/bin/doggo_ransomware.py
Resource
win7-20231023-en
Behavioral task
behavioral30
Sample
Rose-Grabber-main/resources/source/bin/doggo_ransomware.py
Resource
win10v2004-20231023-en
Behavioral task
behavioral31
Sample
Rose-Grabber-main/resources/source/bin/games.py
Resource
win7-20231023-en
Behavioral task
behavioral32
Sample
Rose-Grabber-main/resources/source/bin/games.py
Resource
win10v2004-20231023-en
General
-
Target
Rose-Grabber-main/resources/source/bin/_file.py
-
Size
308B
-
MD5
c81bf2973a33cb913955aff853447a78
-
SHA1
7eee0c80d097bc75adc7393df44339af0eb40ecb
-
SHA256
2aa01a8c63bd91087961e661acad557e00aeb43f8fc1ac7debc0a4a77bda6b3d
-
SHA512
a157de35e034a64e8985cef5e93d422fa934fba9fd15e76010eae2b9a3b5916dac7ba3118278cb8c9a2490b4e20711e8da6c477c0c7764294374c8c040b24ede
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4324 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Rose-Grabber-main\resources\source\bin\_file.py1⤵
- Modifies registry class
PID:3032
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4324