Analysis Overview
SHA256
d26efeb960b006f21abb1a215cbb77fc47cd10c4e9f0722c766239a603d530df
Threat Level: Shows suspicious behavior
The file BlitzedGrabberV12-main_1.zip was found to be: Shows suspicious behavior.
Malicious Activity Summary
Loads dropped DLL
Obfuscated with Agile.Net obfuscator
Program crash
Unsigned PE
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2024-03-14 01:47
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Analysis: behavioral3
Detonation Overview
Submitted
2024-03-14 01:46
Reported
2024-03-14 01:49
Platform
win7-20240221-en
Max time kernel
118s
Max time network
124s
Command Line
Signatures
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12-main\BlitzedGrabberV12\Resources\APIFOR.dll,#1
Network
Files
Analysis: behavioral6
Detonation Overview
Submitted
2024-03-14 01:46
Reported
2024-03-14 01:49
Platform
win10v2004-20240226-en
Max time kernel
131s
Max time network
152s
Command Line
Signatures
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12-main\BlitzedGrabberV12\Resources\BouncyCastle.Crypto.dll,#1
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 204.79.197.200:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 71.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 228.249.119.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 194.178.17.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 200.197.79.204.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.154.82.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.35.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 41.110.16.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 183.59.114.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.31.95.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 149.220.183.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 104.241.123.92.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 119.110.54.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 240.221.184.93.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 217.135.221.88.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 0.204.248.87.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 42.134.221.88.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 180.178.17.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 57.169.31.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 19.229.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
Files
Analysis: behavioral10
Detonation Overview
Submitted
2024-03-14 01:46
Reported
2024-03-14 01:49
Platform
win10v2004-20240226-en
Max time kernel
136s
Max time network
153s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12-main\BlitzedGrabberV12\Resources\UltraEmbeddable.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12-main\BlitzedGrabberV12\Resources\UltraEmbeddable.exe
"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12-main\BlitzedGrabberV12\Resources\UltraEmbeddable.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2124 -ip 2124
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 884
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 149.220.183.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 204.79.197.200:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 200.197.79.204.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 76.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 0.204.248.87.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.154.82.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.165.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 41.110.16.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.150.49.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 104.241.123.92.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 119.110.54.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.134.221.88.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 176.178.17.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 240.221.184.93.in-addr.arpa | udp |
| US | 8.8.8.8:53 | www.microsoft.com | udp |
| GB | 92.123.241.137:80 | www.microsoft.com | tcp |
| GB | 92.123.241.137:80 | www.microsoft.com | tcp |
| US | 8.8.8.8:53 | 178.223.142.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 137.241.123.92.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 217.135.221.88.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 180.178.17.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 55.36.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 48.229.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
Files
memory/2124-0-0x0000000000020000-0x000000000009A000-memory.dmp
memory/2124-1-0x0000000074440000-0x0000000074BF0000-memory.dmp
memory/2124-2-0x0000000074440000-0x0000000074BF0000-memory.dmp
Analysis: behavioral1
Detonation Overview
Submitted
2024-03-14 01:46
Reported
2024-03-14 01:49
Platform
win7-20240220-en
Max time kernel
118s
Max time network
119s
Command Line
Signatures
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12-main\BlitzedGrabberV12\BlitzedGrabberV12.exe | N/A |
Obfuscated with Agile.Net obfuscator
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12-main\BlitzedGrabberV12\BlitzedGrabberV12.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12-main\BlitzedGrabberV12\BlitzedGrabberV12.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12-main\BlitzedGrabberV12\BlitzedGrabberV12.exe
"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12-main\BlitzedGrabberV12\BlitzedGrabberV12.exe"
Network
Files
memory/2912-1-0x0000000074230000-0x000000007491E000-memory.dmp
memory/2912-0-0x0000000001090000-0x000000000123C000-memory.dmp
memory/2912-2-0x0000000004940000-0x0000000004980000-memory.dmp
memory/2912-3-0x0000000004FE0000-0x00000000051D2000-memory.dmp
\Users\Admin\AppData\Local\Temp\dcfb00f9-5ae7-4197-ba59-e48107e40d35\GunaDotNetRT.dll
| MD5 | 9af5eb006bb0bab7f226272d82c896c7 |
| SHA1 | c2a5bb42a5f08f4dc821be374b700652262308f0 |
| SHA256 | 77dc05a6bda90757f66552ee3f469b09f1e00732b4edca0f542872fb591ed9db |
| SHA512 | 7badd41be4c1039302fda9bba19d374ec9446ce24b7db33b66bee4ef38180d1abcd666d2aea468e7e452aa1e1565eedfefed582bf1c2fe477a4171d99d48772a |
memory/2912-11-0x0000000074030000-0x00000000740B0000-memory.dmp
memory/2912-12-0x0000000004FE0000-0x00000000051CE000-memory.dmp
memory/2912-10-0x0000000073A50000-0x0000000073A87000-memory.dmp
memory/2912-13-0x0000000004FE0000-0x00000000051CE000-memory.dmp
memory/2912-15-0x0000000004FE0000-0x00000000051CE000-memory.dmp
memory/2912-17-0x0000000004FE0000-0x00000000051CE000-memory.dmp
memory/2912-19-0x0000000004FE0000-0x00000000051CE000-memory.dmp
memory/2912-21-0x0000000004FE0000-0x00000000051CE000-memory.dmp
memory/2912-23-0x0000000004FE0000-0x00000000051CE000-memory.dmp
memory/2912-25-0x0000000004FE0000-0x00000000051CE000-memory.dmp
memory/2912-33-0x0000000004FE0000-0x00000000051CE000-memory.dmp
memory/2912-37-0x0000000004FE0000-0x00000000051CE000-memory.dmp
memory/2912-39-0x0000000004FE0000-0x00000000051CE000-memory.dmp
memory/2912-35-0x0000000004FE0000-0x00000000051CE000-memory.dmp
memory/2912-31-0x0000000004FE0000-0x00000000051CE000-memory.dmp
memory/2912-43-0x0000000004FE0000-0x00000000051CE000-memory.dmp
memory/2912-45-0x0000000004FE0000-0x00000000051CE000-memory.dmp
memory/2912-49-0x0000000004FE0000-0x00000000051CE000-memory.dmp
memory/2912-51-0x0000000004FE0000-0x00000000051CE000-memory.dmp
memory/2912-55-0x0000000004FE0000-0x00000000051CE000-memory.dmp
memory/2912-53-0x0000000004FE0000-0x00000000051CE000-memory.dmp
memory/2912-47-0x0000000004FE0000-0x00000000051CE000-memory.dmp
memory/2912-41-0x0000000004FE0000-0x00000000051CE000-memory.dmp
memory/2912-57-0x0000000004FE0000-0x00000000051CE000-memory.dmp
memory/2912-59-0x0000000004FE0000-0x00000000051CE000-memory.dmp
memory/2912-61-0x0000000004FE0000-0x00000000051CE000-memory.dmp
memory/2912-63-0x0000000004FE0000-0x00000000051CE000-memory.dmp
memory/2912-65-0x0000000004FE0000-0x00000000051CE000-memory.dmp
memory/2912-29-0x0000000004FE0000-0x00000000051CE000-memory.dmp
memory/2912-67-0x0000000004FE0000-0x00000000051CE000-memory.dmp
memory/2912-69-0x0000000004FE0000-0x00000000051CE000-memory.dmp
memory/2912-71-0x0000000004FE0000-0x00000000051CE000-memory.dmp
memory/2912-27-0x0000000004FE0000-0x00000000051CE000-memory.dmp
memory/2912-73-0x0000000004FE0000-0x00000000051CE000-memory.dmp
memory/2912-6385-0x0000000074230000-0x000000007491E000-memory.dmp
memory/2912-7213-0x0000000004940000-0x0000000004980000-memory.dmp
memory/2912-8031-0x0000000073A50000-0x0000000073A87000-memory.dmp
memory/2912-11669-0x0000000004940000-0x0000000004980000-memory.dmp
memory/2912-11670-0x0000000004940000-0x0000000004980000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12-main\BlitzedGrabberV12\BlitzedGrabberV12.exe.Config
| MD5 | 02bafe634a181de6af59ecfb1a9a7230 |
| SHA1 | 5fb944dc91a95007795d83f2037cfe42f0d959f0 |
| SHA256 | 6288699c8a0e00de7329c8f642bc22e6d7ed873f1decd32f05231cf69cac4470 |
| SHA512 | 3e4dc4ae10bf527b98608883638356a84aa9652707276981458b0d9c58f000b290f24b4fbd1794ef02484ccf5ff43d5b55ab7161f5c9f408f68f7caa0676b362 |
memory/2912-11678-0x0000000004940000-0x0000000004980000-memory.dmp
Analysis: behavioral5
Detonation Overview
Submitted
2024-03-14 01:46
Reported
2024-03-14 01:49
Platform
win7-20240221-en
Max time kernel
118s
Max time network
123s
Command Line
Signatures
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12-main\BlitzedGrabberV12\Resources\BouncyCastle.Crypto.dll,#1
Network
Files
Analysis: behavioral7
Detonation Overview
Submitted
2024-03-14 01:46
Reported
2024-03-14 01:49
Platform
win7-20240221-en
Max time kernel
118s
Max time network
119s
Command Line
Signatures
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12-main\BlitzedGrabberV12\Resources\Newtonsoft.Json.dll,#1
Network
Files
Analysis: behavioral8
Detonation Overview
Submitted
2024-03-14 01:46
Reported
2024-03-14 01:49
Platform
win10v2004-20240226-en
Max time kernel
150s
Max time network
151s
Command Line
Signatures
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12-main\BlitzedGrabberV12\Resources\Newtonsoft.Json.dll,#1
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 228.249.119.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 76.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 194.178.17.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.154.82.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 41.110.16.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 157.123.68.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 56.126.166.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 104.241.123.92.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 119.110.54.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 58.55.71.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.134.221.88.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 176.178.17.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 42.134.221.88.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 64.134.221.88.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 217.135.221.88.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 180.178.17.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 45.19.74.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 19.229.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 43.58.199.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.73.42.20.in-addr.arpa | udp |
| GB | 96.17.178.176:80 | tcp |
Files
Analysis: behavioral9
Detonation Overview
Submitted
2024-03-14 01:46
Reported
2024-03-14 01:49
Platform
win7-20240221-en
Max time kernel
119s
Max time network
120s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12-main\BlitzedGrabberV12\Resources\UltraEmbeddable.exe |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2952 wrote to memory of 1068 | N/A | C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12-main\BlitzedGrabberV12\Resources\UltraEmbeddable.exe | C:\Windows\SysWOW64\WerFault.exe |
| PID 2952 wrote to memory of 1068 | N/A | C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12-main\BlitzedGrabberV12\Resources\UltraEmbeddable.exe | C:\Windows\SysWOW64\WerFault.exe |
| PID 2952 wrote to memory of 1068 | N/A | C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12-main\BlitzedGrabberV12\Resources\UltraEmbeddable.exe | C:\Windows\SysWOW64\WerFault.exe |
| PID 2952 wrote to memory of 1068 | N/A | C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12-main\BlitzedGrabberV12\Resources\UltraEmbeddable.exe | C:\Windows\SysWOW64\WerFault.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12-main\BlitzedGrabberV12\Resources\UltraEmbeddable.exe
"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12-main\BlitzedGrabberV12\Resources\UltraEmbeddable.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2952 -s 552
Network
Files
memory/2952-0-0x0000000000C40000-0x0000000000CBA000-memory.dmp
memory/2952-1-0x0000000074B10000-0x00000000751FE000-memory.dmp
memory/2952-2-0x0000000074B10000-0x00000000751FE000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-03-14 01:46
Reported
2024-03-14 01:49
Platform
win10v2004-20240226-en
Max time kernel
148s
Max time network
151s
Command Line
Signatures
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12-main\BlitzedGrabberV12\BlitzedGrabberV12.exe | N/A |
Obfuscated with Agile.Net obfuscator
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12-main\BlitzedGrabberV12\BlitzedGrabberV12.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12-main\BlitzedGrabberV12\BlitzedGrabberV12.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12-main\BlitzedGrabberV12\BlitzedGrabberV12.exe
"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12-main\BlitzedGrabberV12\BlitzedGrabberV12.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 154.239.44.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.154.82.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 194.178.17.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 204.79.197.200:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 41.110.16.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 68.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 209.205.72.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 103.169.127.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 217.135.221.88.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 232.168.11.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 28.118.140.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 183.142.211.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 48.229.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 0.204.248.87.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 88.156.103.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 104.246.116.51.in-addr.arpa | udp |
Files
memory/636-1-0x0000000074FE0000-0x0000000075790000-memory.dmp
memory/636-0-0x0000000000ED0000-0x000000000107C000-memory.dmp
memory/636-2-0x0000000005F70000-0x0000000006514000-memory.dmp
memory/636-3-0x0000000005A60000-0x0000000005AF2000-memory.dmp
memory/636-4-0x0000000005980000-0x0000000005990000-memory.dmp
memory/636-5-0x0000000005BF0000-0x0000000005BFA000-memory.dmp
memory/636-6-0x0000000006520000-0x0000000006712000-memory.dmp
memory/636-14-0x00000000739F0000-0x0000000073A79000-memory.dmp
memory/636-15-0x00000000716E0000-0x0000000071717000-memory.dmp
memory/636-16-0x0000000006520000-0x000000000670E000-memory.dmp
memory/636-17-0x0000000006520000-0x000000000670E000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\dcfb00f9-5ae7-4197-ba59-e48107e40d35\GunaDotNetRT.dll
| MD5 | 9af5eb006bb0bab7f226272d82c896c7 |
| SHA1 | c2a5bb42a5f08f4dc821be374b700652262308f0 |
| SHA256 | 77dc05a6bda90757f66552ee3f469b09f1e00732b4edca0f542872fb591ed9db |
| SHA512 | 7badd41be4c1039302fda9bba19d374ec9446ce24b7db33b66bee4ef38180d1abcd666d2aea468e7e452aa1e1565eedfefed582bf1c2fe477a4171d99d48772a |
memory/636-19-0x0000000006520000-0x000000000670E000-memory.dmp
memory/636-21-0x0000000006520000-0x000000000670E000-memory.dmp
memory/636-23-0x0000000006520000-0x000000000670E000-memory.dmp
memory/636-25-0x0000000006520000-0x000000000670E000-memory.dmp
memory/636-27-0x0000000006520000-0x000000000670E000-memory.dmp
memory/636-29-0x0000000006520000-0x000000000670E000-memory.dmp
memory/636-31-0x0000000006520000-0x000000000670E000-memory.dmp
memory/636-33-0x0000000006520000-0x000000000670E000-memory.dmp
memory/636-35-0x0000000006520000-0x000000000670E000-memory.dmp
memory/636-37-0x0000000006520000-0x000000000670E000-memory.dmp
memory/636-39-0x0000000006520000-0x000000000670E000-memory.dmp
memory/636-41-0x0000000006520000-0x000000000670E000-memory.dmp
memory/636-43-0x0000000006520000-0x000000000670E000-memory.dmp
memory/636-45-0x0000000006520000-0x000000000670E000-memory.dmp
memory/636-47-0x0000000006520000-0x000000000670E000-memory.dmp
memory/636-49-0x0000000006520000-0x000000000670E000-memory.dmp
memory/636-51-0x0000000006520000-0x000000000670E000-memory.dmp
memory/636-53-0x0000000006520000-0x000000000670E000-memory.dmp
memory/636-55-0x0000000006520000-0x000000000670E000-memory.dmp
memory/636-57-0x0000000006520000-0x000000000670E000-memory.dmp
memory/636-59-0x0000000006520000-0x000000000670E000-memory.dmp
memory/636-61-0x0000000006520000-0x000000000670E000-memory.dmp
memory/636-63-0x0000000006520000-0x000000000670E000-memory.dmp
memory/636-65-0x0000000006520000-0x000000000670E000-memory.dmp
memory/636-67-0x0000000006520000-0x000000000670E000-memory.dmp
memory/636-69-0x0000000006520000-0x000000000670E000-memory.dmp
memory/636-71-0x0000000006520000-0x000000000670E000-memory.dmp
memory/636-73-0x0000000006520000-0x000000000670E000-memory.dmp
memory/636-75-0x0000000006520000-0x000000000670E000-memory.dmp
memory/636-77-0x0000000006520000-0x000000000670E000-memory.dmp
memory/636-2933-0x0000000074FE0000-0x0000000075790000-memory.dmp
memory/636-3308-0x0000000005980000-0x0000000005990000-memory.dmp
memory/636-3704-0x00000000716E0000-0x0000000071717000-memory.dmp
memory/636-11673-0x0000000006AA0000-0x0000000006B3C000-memory.dmp
memory/636-11674-0x0000000005980000-0x0000000005990000-memory.dmp
memory/636-11675-0x0000000005980000-0x0000000005990000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12-main\BlitzedGrabberV12\BlitzedGrabberV12.exe.Config
| MD5 | 02bafe634a181de6af59ecfb1a9a7230 |
| SHA1 | 5fb944dc91a95007795d83f2037cfe42f0d959f0 |
| SHA256 | 6288699c8a0e00de7329c8f642bc22e6d7ed873f1decd32f05231cf69cac4470 |
| SHA512 | 3e4dc4ae10bf527b98608883638356a84aa9652707276981458b0d9c58f000b290f24b4fbd1794ef02484ccf5ff43d5b55ab7161f5c9f408f68f7caa0676b362 |
memory/636-11683-0x0000000005980000-0x0000000005990000-memory.dmp
memory/636-11684-0x0000000005980000-0x0000000005990000-memory.dmp
memory/636-11685-0x0000000005980000-0x0000000005990000-memory.dmp
memory/636-11686-0x0000000005980000-0x0000000005990000-memory.dmp
Analysis: behavioral4
Detonation Overview
Submitted
2024-03-14 01:46
Reported
2024-03-14 01:49
Platform
win10v2004-20240226-en
Max time kernel
151s
Max time network
151s
Command Line
Signatures
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12-main\BlitzedGrabberV12\Resources\APIFOR.dll,#1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1408 --field-trial-handle=2744,i,16362475727591565961,3676688664819797550,262144 --variations-seed-version /prefetch:8
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 76.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.154.82.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 41.110.16.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 228.249.119.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 204.79.197.200:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 200.197.79.204.in-addr.arpa | udp |
| GB | 172.217.169.74:443 | tcp | |
| US | 8.8.8.8:53 | 68.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 209.205.72.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 183.59.114.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 13.107.253.64:443 | tcp | |
| US | 8.8.8.8:53 | 217.135.221.88.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 43.58.199.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 19.229.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.35.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 27.73.42.20.in-addr.arpa | udp |