Analysis

  • max time kernel
    122s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 22:18

General

  • Target

    Blank-Grabber-main/Blank Grabber/env/Scripts/build/Built.exe/PYZ-00.pyz

  • Size

    1.6MB

  • MD5

    f64a698c05e1400327179d88aaa3ce02

  • SHA1

    bf21c6eba63829084e2ea14d540a7817bb56a7e5

  • SHA256

    a8ad1a6d1aefa1536addb6bf6f6b900d3d6ff1c2e11d764ee726653d2036b760

  • SHA512

    2472c397ad0d3623f84bbed19f178b3ec9d99dc8e2b1d5797267bc44a6ee5613890be7153f789740b4daef32605af007fe1b6f95a9e407654a2f60e4c03d24f8

  • SSDEEP

    24576:kozI+9DvSCJRCMmYyOJTAVpaQ+OlkA0pXB9pU8LBVUf1zAbz/jlplIUxakjg:RzHvLJR9JTSQ380XBfU8LLo1WjFxf0

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Blank-Grabber-main\Blank Grabber\env\Scripts\build\Built.exe\PYZ-00.pyz"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2460
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Blank-Grabber-main\Blank Grabber\env\Scripts\build\Built.exe\PYZ-00.pyz
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2704
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Blank-Grabber-main\Blank Grabber\env\Scripts\build\Built.exe\PYZ-00.pyz"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2380

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    58b759c7d4a03c3f3b1abb57a1e41d14

    SHA1

    dde6d5282cfb4d75c30f57bc44e5614d4d9e3392

    SHA256

    2e82e91f2339f37d2923b73745dd9ec1f5f9e9858c0eb17844970e6ec371ed20

    SHA512

    d9229f7d42d23ac5c31234f8e1037180f8b3aaa580249ac508d2f4741a5334d727dad328bb85c55aacd127e03183a907fcafa02ac5dcc0a4e5a5d238192eede5