Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07/02/2025, 16:17

General

  • Target

    Black-Grabber-V3-main/Black-Grabber-V3/options/Screenshot.py

  • Size

    1KB

  • MD5

    cefaed075578c6a22f0f652372a58283

  • SHA1

    e9d631cd1741b44935325178f376c511a92f22a4

  • SHA256

    f0bc04268c586f3852d7ac521cc2f88fdf6d2b4ed3e45d27eb7e8166a24bed70

  • SHA512

    33a968c643b0a68f421841754818330c7843e2fcbac2bd347f16eac0dc367d0e8e9a34211c462d619f08e69de271bfd009e532e1cb950d6c105b3f3ae0215706

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Black-Grabber-V3-main\Black-Grabber-V3\options\Screenshot.py
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1416
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Black-Grabber-V3-main\Black-Grabber-V3\options\Screenshot.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2032
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Black-Grabber-V3-main\Black-Grabber-V3\options\Screenshot.py"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:3068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    d67d12deb97672a854b24923764c9b99

    SHA1

    3e1c365b6fa0098060c81d37cc573115dcfd58d0

    SHA256

    bcc942c023bc86d0911789ea6e06c3dacc74000b2bd26a5530ce7034d6274500

    SHA512

    ea0b395b1aaf8bf2beb3c73204abc53b9f85ac5c85eefc9d312f523f81f2df8f59e5f94915fd76e146281435c1cd7b761994ab4a9ae4771250e1add156f1b516