Threat name:
Blank Grabber, SilverRat, Umbral Stealer
Alert
Classification:
troj.spyw.expl.evad.mine
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Bypasses PowerShell execution policy
Changes security center settings (notifications, updates, antivirus, firewall)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Creates autostart registry keys with suspicious names
Detected Stratum mining protocol
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found strings related to Crypto-Mining
Found suspicious powershell code related to unpacking or dynamic code loading
Hooks files or directories query functions (used to hide files and directories)
Hooks processes query functions (used to hide processes)
Hooks registry keys query functions (used to hide registry keys)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Modifies the prolog of user mode functions (user mode inline hooks)
Modifies Windows Defender protection settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
Protects its processes via BreakOnTermination flag
Query firmware table information (likely to detect VMs)
Reads the Security eventlog
Reads the System eventlog
Sample uses string decryption to hide its real strings
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: Potential WinAPI Calls Via CommandLine
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Powershell Defender Disable Scan Feature
Sigma detected: WScript or CScript Dropper
Suspicious powershell command line found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected Blank Grabber
Yara detected UAC Bypass using CMSTP
Yara detected Umbral Stealer
Yara detected Xmrig cryptocurrency miner
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1714057
Sample:
main.exe
Startdate:
13/06/2025
Architecture:
WINDOWS
Score:
100
93
de.monero.herominers.com
2->93
95
date-enclosed.gl.at.ply.gg
2->95
97
3 other IPs or domains
2->97
107
Sigma detected: Xmrig
2->107
109
Found malware configuration
2->109
111
Malicious sample detected
(through community Yara
rule)
2->111
113
24 other signatures
2->113
10
$77smartscreen.exe
15
3
2->10
started
14
cmd.exe
2->14
started
16
main.exe
3
2->16
started
19
5 other processes
2->19
signatures3
process4
dnsIp5
103
date-enclosed.gl.at.ply.gg
147.185.221.28, 20227
SALSGIVERUS
United States
10->103
105
discord.com
162.159.135.232, 443, 49724
CLOUDFLARENETUS
United States
10->105
159
Protects its processes
via BreakOnTermination
flag
10->159
161
Found many strings related
to Crypto-Wallets (likely
being stolen)
10->161
163
Creates autostart registry
keys with suspicious
names
10->163
181
5 other signatures
10->181
21
RegAsm.exe
10->21
started
25
RegAsm.exe
10->25
started
28
powershell.exe
10->28
started
36
6 other processes
10->36
165
Suspicious powershell
command line found
14->165
167
Wscript starts Powershell
(via cmd or directly)
14->167
169
Obfuscated command line
found
14->169
30
powershell.exe
14->30
started
79
C:\ProgramData\$77smartscreen.exe, PE32
16->79
dropped
81
C:\Users\user\AppData\Local\...\main.exe.log, CSV
16->81
dropped
171
Bypasses PowerShell
execution policy
16->171
173
Adds a directory exclusion
to Windows Defender
16->173
32
powershell.exe
23
16->32
started
34
powershell.exe
23
16->34
started
175
Antivirus detection
for dropped file
19->175
177
Multi AV Scanner detection
for dropped file
19->177
179
Changes security center
settings (notifications,
updates, antivirus,
firewall)
19->179
file6
signatures7
process8
dnsIp9
99
api.filedoge.com
49.13.193.134, 443, 49723
HETZNER-ASDE
Germany
21->99
83
C:\Users\user\AppData\...\$77xmrig.exe, PE32+
21->83
dropped
85
C:\Users\user\AppData\Roaming\...\$77lol.vbs, ASCII
21->85
dropped
87
C:\Users\user\AppData\...\$77haideptrai.bat, ASCII
21->87
dropped
38
wscript.exe
21->38
started
89
C:\Users\user\AppData\...\lqsf2km2.cmdline, Unicode
25->89
dropped
143
Loading BitLocker PowerShell
Module
25->143
145
Reads the Security eventlog
25->145
147
Reads the System eventlog
25->147
41
csc.exe
25->41
started
44
conhost.exe
28->44
started
149
Writes to foreign memory
regions
30->149
151
Creates a thread in
another existing process
(thread injection)
30->151
153
Injects a PE file into
a foreign processes
30->153
46
winlogon.exe
30->46
injected
48
conhost.exe
30->48
started
155
Found many strings related
to Crypto-Wallets (likely
being stolen)
32->155
157
Found suspicious powershell
code related to unpacking
or dynamic code loading
32->157
50
conhost.exe
32->50
started
52
conhost.exe
34->52
started
54
conhost.exe
36->54
started
file10
signatures11
process12
file13
115
Wscript starts Powershell
(via cmd or directly)
38->115
117
Windows Scripting host
queries suspicious COM
object (likely to drop
second stage)
38->117
56
cmd.exe
38->56
started
91
C:\Users\user\AppData\Local\...\lqsf2km2.dll, PE32
41->91
dropped
58
conhost.exe
41->58
started
60
cvtres.exe
41->60
started
119
Found strings related
to Crypto-Mining
46->119
121
Injects code into the
Windows Explorer (explorer.exe)
46->121
123
Contains functionality
to inject code into
remote processes
46->123
125
4 other signatures
46->125
62
svchost.exe
46->62
injected
65
lsass.exe
46->65
injected
67
svchost.exe
46->67
injected
69
9 other processes
46->69
signatures14
process15
signatures16
71
$77xmrig.exe
56->71
started
75
conhost.exe
56->75
started
183
Writes to foreign memory
regions
62->183
185
Creates a thread in
another existing process
(thread injection)
62->185
187
Injects a PE file into
a foreign processes
62->187
77
wscript.exe
62->77
started
process17
dnsIp18
101
de.monero.herominers.com
141.95.126.31, 1111, 49726
DFNVereinzurFoerderungeinesDeutschenForschungsnetzese
Germany
71->101
127
Multi AV Scanner detection
for dropped file
71->127
129
Query firmware table
information (likely
to detect VMs)
71->129
131
Found strings related
to Crypto-Mining
71->131
133
Writes to foreign memory
regions
77->133
135
Allocates memory in
foreign processes
77->135
137
Windows Scripting host
queries suspicious COM
object (likely to drop
second stage)
77->137
141
2 other signatures
77->141
signatures19
139
Detected Stratum mining
protocol
101->139
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.