Threat name:
Blank Grabber, SilentXMRMiner, Xmrig
Alert
Classification:
rans.troj.adwa.spyw.expl.evad.mine
Adds a directory exclusion to Windows Defender
AI detected suspicious sample
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Bypasses PowerShell execution policy
Creates a thread in another existing process (thread injection)
Detected Stratum mining protocol
Encrypted powershell cmdline option found
Found direct / indirect Syscall (likely to bypass EDR)
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Loading BitLocker PowerShell Module
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies existing user documents (likely ransomware behavior)
Modifies the context of a thread in another process (thread injection)
Modifies Windows Defender protection settings
Multi AV Scanner detection for submitted file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Removes signatures from Windows Defender
Sample is not signed and drops a device driver
Sigma detected: Capture Wi-Fi password
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Powershell Defender Disable Scan Feature
Sigma detected: Rar Usage with Password and Compression Level
Sigma detected: Suspicious Encoded PowerShell Command Line
Sigma detected: Suspicious PowerShell Encoded Command Patterns
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: Suspicious Startup Folder Persistence
Suspicious powershell command line found
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal WLAN passwords
Tries to steal Crypto Currency Wallets
Uses cmd line tools excessively to alter registry or file data
Uses netsh to modify the Windows network and firewall settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes or reads registry keys via WMI
Writes to foreign memory regions
Yara detected Blank Grabber
Yara detected SilentXMRMiner
Yara detected Xmrig cryptocurrency miner
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1561956
Sample:
main.exe
Startdate:
24/11/2024
Architecture:
WINDOWS
Score:
100
130
monerooceans.stream
2->130
132
ip-api.com
2->132
134
2 other IPs or domains
2->134
156
Sigma detected: Xmrig
2->156
158
Malicious sample detected
(through community Yara
rule)
2->158
160
Antivirus / Scanner
detection for submitted
sample
2->160
162
18 other signatures
2->162
13
main.exe
3
2->13
started
16
services64.exe
2->16
started
signatures3
process4
file5
118
C:\Users\user\AppData\Local\Temp\sxmr.exe, PE32+
13->118
dropped
120
C:\Users\user\AppData\Local\Temp\Built.exe, PE32+
13->120
dropped
19
Built.exe
22
13->19
started
23
sxmr.exe
13->23
started
142
Writes to foreign memory
regions
16->142
144
Allocates memory in
foreign processes
16->144
146
Creates a thread in
another existing process
(thread injection)
16->146
25
conhost.exe
16->25
started
signatures6
process7
file8
106
C:\Users\user\AppData\Local\Temp\...\rar.exe, PE32+
19->106
dropped
108
C:\Users\user\AppData\Local\...\rarreg.key, ASCII
19->108
dropped
110
C:\Users\user\AppData\...\unicodedata.pyd, PE32+
19->110
dropped
112
16 other files (none is malicious)
19->112
dropped
166
Modifies Windows Defender
protection settings
19->166
168
Adds a directory exclusion
to Windows Defender
19->168
170
Tries to harvest and
steal WLAN passwords
19->170
172
Removes signatures from
Windows Defender
19->172
27
Built.exe
1
72
19->27
started
174
Writes to foreign memory
regions
23->174
176
Allocates memory in
foreign processes
23->176
178
Creates a thread in
another existing process
(thread injection)
23->178
31
conhost.exe
4
23->31
started
34
sihost64.exe
25->34
started
36
cmd.exe
25->36
started
38
cmd.exe
25->38
started
signatures9
process10
dnsIp11
136
ip-api.com
208.95.112.1, 49743, 80
TUT-ASUS
United States
27->136
138
discord.com
162.159.135.232, 443, 49744
CLOUDFLARENETUS
United States
27->138
222
Found many strings related
to Crypto-Wallets (likely
being stolen)
27->222
224
Tries to harvest and
steal browser information
(history, passwords,
etc)
27->224
226
Modifies Windows Defender
protection settings
27->226
238
5 other signatures
27->238
40
cmd.exe
27->40
started
43
cmd.exe
27->43
started
53
30 other processes
27->53
122
C:\Users\user\AppData\...\services64.exe, PE32+
31->122
dropped
228
Adds a directory exclusion
to Windows Defender
31->228
45
cmd.exe
31->45
started
47
cmd.exe
1
31->47
started
49
cmd.exe
1
31->49
started
230
Writes to foreign memory
regions
34->230
232
Allocates memory in
foreign processes
34->232
234
Creates a thread in
another existing process
(thread injection)
34->234
236
Found direct / indirect
Syscall (likely to bypass
EDR)
34->236
51
conhost.exe
34->51
started
55
3 other processes
36->55
57
2 other processes
38->57
file12
signatures13
process14
signatures15
194
Modifies Windows Defender
protection settings
40->194
196
Removes signatures from
Windows Defender
40->196
70
3 other processes
40->70
198
Adds a directory exclusion
to Windows Defender
43->198
72
2 other processes
43->72
59
services64.exe
45->59
started
62
conhost.exe
45->62
started
200
Suspicious powershell
command line found
47->200
202
Uses cmd line tools
excessively to alter
registry or file data
47->202
204
Encrypted powershell
cmdline option found
47->204
208
3 other signatures
47->208
74
3 other processes
47->74
64
schtasks.exe
49->64
started
66
conhost.exe
49->66
started
206
Tries to harvest and
steal WLAN passwords
53->206
68
getmac.exe
53->68
started
76
58 other processes
53->76
process16
file17
210
Writes to foreign memory
regions
59->210
212
Allocates memory in
foreign processes
59->212
214
Creates a thread in
another existing process
(thread injection)
59->214
79
conhost.exe
59->79
started
216
Queries sensitive network
adapter information
(via WMI, Win32_NetworkAdapter,
often done to detect
virtual machines)
64->216
218
Writes or reads registry
keys via WMI
64->218
114
C:\Users\user\AppData\...\shcaicw5.cmdline, Unicode
76->114
dropped
116
C:\Users\user\AppData\Local\Temp\A82cZ.zip, RAR
76->116
dropped
220
Loading BitLocker PowerShell
Module
76->220
83
csc.exe
76->83
started
85
conhost.exe
76->85
started
signatures18
process19
file20
124
C:\Users\user\AppData\...\sihost64.exe, PE32+
79->124
dropped
126
C:\Users\user\AppData\Roaming\...\WR64.sys, PE32+
79->126
dropped
148
Injects code into the
Windows Explorer (explorer.exe)
79->148
150
Writes to foreign memory
regions
79->150
152
Modifies the context
of a thread in another
process (thread injection)
79->152
154
3 other signatures
79->154
87
sihost64.exe
79->87
started
90
cmd.exe
79->90
started
92
explorer.exe
79->92
started
128
C:\Users\user\AppData\Local\...\shcaicw5.dll, PE32
83->128
dropped
95
cvtres.exe
83->95
started
signatures21
process22
dnsIp23
180
Writes to foreign memory
regions
87->180
182
Allocates memory in
foreign processes
87->182
184
Creates a thread in
another existing process
(thread injection)
87->184
97
conhost.exe
87->97
started
186
Adds a directory exclusion
to Windows Defender
90->186
99
powershell.exe
90->99
started
102
conhost.exe
90->102
started
104
powershell.exe
90->104
started
140
monerooceans.stream
149.102.143.109, 10128, 49740
COGENT-174US
United States
92->140
188
System process connects
to network (likely due
to code injection or
exploit)
92->188
190
Query firmware table
information (likely
to detect VMs)
92->190
signatures24
192
Detected Stratum mining
protocol
140->192
process25
signatures26
164
Loading BitLocker PowerShell
Module
99->164
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.