Analysis

  • max time kernel
    121s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 22:18

General

  • Target

    Blank-Grabber-main/Blank Grabber/env/Scripts/build/Built.exe/Analysis-00.toc

  • Size

    25KB

  • MD5

    67e0e46b74732b0dd2d371ffe86fdca7

  • SHA1

    21ca34f533dcd30c59517a205d31a212ee0184b1

  • SHA256

    24f17db07acffed58bca943a295bb76d344930c257aa668adcf9966a039e17f4

  • SHA512

    300b799316ef6aa7abea3f2208931b88dad79351764dde3ff19aa89435731429a29a830af177e6c277e1ac81c317798881ea0dba823dcbfd1a901e1f25c4209b

  • SSDEEP

    192:anRk7se9bP6mG9tf878KrlXm04dKrlLcR5n1vDlbgDJk5JhGFyNh8481tf1y/qM/:aSQhYDVEoC5n98VbENL

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Blank-Grabber-main\Blank Grabber\env\Scripts\build\Built.exe\Analysis-00.toc"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2180
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Blank-Grabber-main\Blank Grabber\env\Scripts\build\Built.exe\Analysis-00.toc
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2532
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Blank-Grabber-main\Blank Grabber\env\Scripts\build\Built.exe\Analysis-00.toc"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2988

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    4335927fb925176d6f6acd341a9bfb0d

    SHA1

    76cd3182dd3f0ec4569e14a432f09fd90fb7d8dd

    SHA256

    6c5b7b0d5f3898505a0a3ae7d20a6ca7a718b2ce9b834159615ebd31187aac0e

    SHA512

    aaa7c5e1168626209b3eb7cd5a73fae1b06e0a4a9df06b365266f04b61eaa7085764ac101d2c1697907ecdd1c66ce128d276dce892d3707181a63ec31a5f9636