Threat name:
Blank Grabber, PureLog Stealer, Umbral S
Alert
Classification:
troj.adwa.spyw.evad
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Check if machine is in data center or colocation facility
Creates multiple autostart registry keys
Drops PE files to the startup folder
Drops PE files with a suspicious file extension
Found direct / indirect Syscall (likely to bypass EDR)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Modifies Windows Defender protection settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file has nameless sections
Protects its processes via BreakOnTermination flag
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Powershell Defender Disable Scan Feature
Sigma detected: Rare Remote Thread Creation By Uncommon Source Image
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Set autostart key via New-ItemProperty Cmdlet
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: Suspicious Startup Folder Persistence
Suricata IDS alerts for network traffic
Suspicious powershell command line found
Tries to detect debuggers (CloseHandle check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to evade analysis by execution special instruction (VM detection)
Tries to harvest and steal browser information (history, passwords, etc)
Uses attrib.exe to hide files
Uses ping.exe to check the status of other devices and networks
Writes to foreign memory regions
Yara detected Blank Grabber
Yara detected PureLog Stealer
Yara detected Umbral Stealer
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1752883
Sample:
XD.exe
Startdate:
08/08/2025
Architecture:
WINDOWS
Score:
100
124
open-tyler.gl.at.ply.gg
2->124
126
ip-api.com
2->126
128
discord.com
2->128
148
Suricata IDS alerts
for network traffic
2->148
150
Found malware configuration
2->150
152
Malicious sample detected
(through community Yara
rule)
2->152
154
23 other signatures
2->154
11
XD.exe
4
2->11
started
14
HWMonitor.exe
2->14
started
17
HWMonitor.exe
2->17
started
19
2 other processes
2->19
signatures3
process4
file5
116
C:\Users\user\AppData\Local\Temp\temp.exe, PE32
11->116
dropped
118
C:\Users\user\AppData\Local\Temp\hwid.exe, PE32
11->118
dropped
120
C:\Users\user\AppData\Local\Temp\XD.exe, PE32+
11->120
dropped
21
temp.exe
5
11->21
started
25
hwid.exe
5
11->25
started
27
XD.exe
1
11->27
started
196
Antivirus detection
for dropped file
14->196
198
Multi AV Scanner detection
for dropped file
14->198
29
RegAsm.exe
14->29
started
31
RegAsm.exe
17->31
started
33
RegAsm.exe
17->33
started
35
RegAsm.exe
17->35
started
37
RegAsm.exe
19->37
started
39
2 other processes
19->39
signatures6
process7
file8
106
C:\Users\user\AppData\...\HWMonitor.exe, PE32
21->106
dropped
156
Antivirus detection
for dropped file
21->156
158
Multi AV Scanner detection
for dropped file
21->158
160
Suspicious powershell
command line found
21->160
41
RegAsm.exe
2
21->41
started
45
powershell.exe
1
11
21->45
started
108
C:\Users\user\AppData\...\HWMonitor.exe, PE32
25->108
dropped
162
Found many strings related
to Crypto-Wallets (likely
being stolen)
25->162
164
Writes to foreign memory
regions
25->164
166
Allocates memory in
foreign processes
25->166
168
Injects a PE file into
a foreign processes
25->168
47
RegAsm.exe
16
11
25->47
started
50
powershell.exe
1
11
25->50
started
52
conhost.exe
25->52
started
54
conhost.exe
25->54
started
170
Overwrites code with
unconditional jumps
- possibly settings
hooks in foreign process
27->170
172
Query firmware table
information (likely
to detect VMs)
27->172
174
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
27->174
176
4 other signatures
27->176
56
conhost.exe
27->56
started
58
ds.exe
31->58
started
60
ds.exe
37->60
started
signatures9
process10
dnsIp11
110
C:\Users\user\AppData\Local\Temp\ds.exe, PE32
41->110
dropped
178
Suspicious powershell
command line found
41->178
180
Drops PE files with
a suspicious file extension
41->180
182
Drops PE files to the
startup folder
41->182
194
2 other signatures
41->194
62
ds.exe
41->62
started
184
Creates multiple autostart
registry keys
45->184
67
conhost.exe
45->67
started
132
ip-api.com
208.95.112.1, 49691, 49692, 80
TUT-ASUS
United States
47->132
134
discord.com
162.159.135.232, 443, 49693
CLOUDFLARENETUS
United States
47->134
112
C:\ProgramData\Microsoft\...\FHJbd.scr, PE32
47->112
dropped
114
C:\Windows\System32\drivers\etc\hosts, ASCII
47->114
dropped
186
Found many strings related
to Crypto-Wallets (likely
being stolen)
47->186
188
Tries to harvest and
steal browser information
(history, passwords,
etc)
47->188
190
Modifies Windows Defender
protection settings
47->190
192
Modifies the hosts file
47->192
69
cmd.exe
47->69
started
71
powershell.exe
47->71
started
73
WMIC.exe
47->73
started
77
9 other processes
47->77
75
conhost.exe
50->75
started
file12
signatures13
process14
dnsIp15
130
open-tyler.gl.at.ply.gg
147.185.221.30, 49694, 49696, 49697
SALSGIVERUS
United States
62->130
122
C:\Users\user\AppData\...\RuntimeBroker.exe, PE32
62->122
dropped
136
Antivirus detection
for dropped file
62->136
138
Multi AV Scanner detection
for dropped file
62->138
140
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
62->140
146
3 other signatures
62->146
79
powershell.exe
62->79
started
82
powershell.exe
62->82
started
84
powershell.exe
62->84
started
92
2 other processes
62->92
142
Uses ping.exe to check
the status of other
devices and networks
69->142
94
2 other processes
69->94
144
Loading BitLocker PowerShell
Module
71->144
86
conhost.exe
71->86
started
88
conhost.exe
73->88
started
90
conhost.exe
77->90
started
96
6 other processes
77->96
file16
signatures17
process18
signatures19
200
Loading BitLocker PowerShell
Module
79->200
98
conhost.exe
79->98
started
100
conhost.exe
82->100
started
102
conhost.exe
84->102
started
104
conhost.exe
92->104
started
process20
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.