Analysis

  • max time kernel
    1173s
  • max time network
    1177s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-de
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-delocale:de-deos:windows10-2004-x64systemwindows
  • submitted
    06-03-2024 14:48

General

  • Target

    Blank-Grabber-main/Blank Grabber/Components/loader.py

  • Size

    634B

  • MD5

    ca35548638710a32f6d4bc1a61a103c5

  • SHA1

    2703967c4376cc2e0ca20191eff97b85989d8310

  • SHA256

    e7dbfe873c719006f28e6526ef54215d7b7598bce5566734c552dab9f1f487e6

  • SHA512

    d1c0839326662b240dfa4bcea7284d261be46e9bb8b03f073e0328e361321f9cdfa740abd4541b2cdc21c806bcd901d3bc3cc36b9f7e0ee6191d189df0533061

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Blank-Grabber-main\Blank Grabber\Components\loader.py"
    1⤵
    • Modifies registry class
    PID:3216
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2096
  • C:\Windows\system32\rundll32.exe
    "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
    1⤵
      PID:1000
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k UnistackSvcGroup
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:5092

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/5092-0-0x000001C42DE40000-0x000001C42DE50000-memory.dmp

      Filesize

      64KB

    • memory/5092-16-0x000001C42DF40000-0x000001C42DF50000-memory.dmp

      Filesize

      64KB

    • memory/5092-32-0x000001C436520000-0x000001C436521000-memory.dmp

      Filesize

      4KB

    • memory/5092-33-0x000001C436550000-0x000001C436551000-memory.dmp

      Filesize

      4KB

    • memory/5092-34-0x000001C436550000-0x000001C436551000-memory.dmp

      Filesize

      4KB

    • memory/5092-35-0x000001C436550000-0x000001C436551000-memory.dmp

      Filesize

      4KB

    • memory/5092-36-0x000001C436550000-0x000001C436551000-memory.dmp

      Filesize

      4KB

    • memory/5092-37-0x000001C436550000-0x000001C436551000-memory.dmp

      Filesize

      4KB

    • memory/5092-38-0x000001C436550000-0x000001C436551000-memory.dmp

      Filesize

      4KB

    • memory/5092-39-0x000001C436550000-0x000001C436551000-memory.dmp

      Filesize

      4KB

    • memory/5092-40-0x000001C436550000-0x000001C436551000-memory.dmp

      Filesize

      4KB

    • memory/5092-41-0x000001C436550000-0x000001C436551000-memory.dmp

      Filesize

      4KB

    • memory/5092-42-0x000001C436550000-0x000001C436551000-memory.dmp

      Filesize

      4KB

    • memory/5092-43-0x000001C436170000-0x000001C436171000-memory.dmp

      Filesize

      4KB

    • memory/5092-44-0x000001C436160000-0x000001C436161000-memory.dmp

      Filesize

      4KB

    • memory/5092-46-0x000001C436170000-0x000001C436171000-memory.dmp

      Filesize

      4KB

    • memory/5092-49-0x000001C436160000-0x000001C436161000-memory.dmp

      Filesize

      4KB

    • memory/5092-52-0x000001C4360A0000-0x000001C4360A1000-memory.dmp

      Filesize

      4KB

    • memory/5092-64-0x000001C4362A0000-0x000001C4362A1000-memory.dmp

      Filesize

      4KB

    • memory/5092-66-0x000001C4362B0000-0x000001C4362B1000-memory.dmp

      Filesize

      4KB

    • memory/5092-67-0x000001C4362B0000-0x000001C4362B1000-memory.dmp

      Filesize

      4KB

    • memory/5092-68-0x000001C4363C0000-0x000001C4363C1000-memory.dmp

      Filesize

      4KB

    • memory/5092-69-0x000001C4362B0000-0x000001C4362B1000-memory.dmp

      Filesize

      4KB

    • memory/5092-70-0x000001C4362B0000-0x000001C4362B1000-memory.dmp

      Filesize

      4KB

    • memory/5092-71-0x000001C4362B0000-0x000001C4362B1000-memory.dmp

      Filesize

      4KB

    • memory/5092-72-0x000001C4362B0000-0x000001C4362B1000-memory.dmp

      Filesize

      4KB

    • memory/5092-73-0x000001C4362B0000-0x000001C4362B1000-memory.dmp

      Filesize

      4KB

    • memory/5092-74-0x000001C4362B0000-0x000001C4362B1000-memory.dmp

      Filesize

      4KB

    • memory/5092-75-0x000001C4362B0000-0x000001C4362B1000-memory.dmp

      Filesize

      4KB

    • memory/5092-76-0x000001C4362B0000-0x000001C4362B1000-memory.dmp

      Filesize

      4KB

    • memory/5092-77-0x000001C4362B0000-0x000001C4362B1000-memory.dmp

      Filesize

      4KB

    • memory/5092-78-0x000001C4362B0000-0x000001C4362B1000-memory.dmp

      Filesize

      4KB

    • memory/5092-79-0x000001C4362B0000-0x000001C4362B1000-memory.dmp

      Filesize

      4KB