Threat name:
Blank Grabber, SheetRat, XWorm, Xmrig
Alert
Classification:
rans.troj.spyw.expl.evad.mine
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Creates a thread in another existing process (thread injection)
Drops PE files to the user root directory
Encrypted powershell cmdline option found
Found direct / indirect Syscall (likely to bypass EDR)
Found malware configuration
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Modifies existing user documents (likely ransomware behavior)
Modifies the context of a thread in another process (thread injection)
Modifies Windows Defender protection settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Removes signatures from Windows Defender
Sample is not signed and drops a device driver
Sample uses string decryption to hide its real strings
Sigma detected: Capture Wi-Fi password
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Powershell Defender Disable Scan Feature
Sigma detected: Rar Usage with Password and Compression Level
Sigma detected: Suspicious Encoded PowerShell Command Line
Sigma detected: Suspicious PowerShell Encoded Command Patterns
Sigma detected: Suspicious Startup Folder Persistence
Suricata IDS alerts for network traffic
Suspicious powershell command line found
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal WLAN passwords
Tries to steal Crypto Currency Wallets
Unusual module load detection (module proxying)
Uses netsh to modify the Windows network and firewall settings
Uses schtasks.exe or at.exe to add and modify task schedules
Uses the Telegram API (likely for C&C communication)
Uses WMIC command to query system information (often done to detect virtual machines)
Writes or reads registry keys via WMI
Writes to foreign memory regions
Yara detected Blank Grabber
Yara detected Telegram RAT
Yara detected Telegram Recon
Yara detected Xmrig cryptocurrency miner
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1832642
Sample:
5z1K7BPqCm.exe
Startdate:
14/12/2025
Architecture:
WINDOWS
Score:
100
164
api.telegram.org
2->164
166
pool.supportxmr.com
2->166
168
2 other IPs or domains
2->168
190
Sigma detected: Xmrig
2->190
192
Suricata IDS alerts
for network traffic
2->192
194
Found malware configuration
2->194
198
28 other signatures
2->198
14
5z1K7BPqCm.exe
5
2->14
started
17
svchost.exe
2->17
started
19
svchost.exe
2->19
started
21
Everything.exe
2->21
started
signatures3
196
Uses the Telegram API
(likely for C&C
communication)
164->196
process4
file5
156
C:\Users\...\shellbag_analyzer_cleaner.exe, PE32
14->156
dropped
158
C:\Users\user\AppData\Roaming\Output.exe, PE32
14->158
dropped
160
C:\Users\user\AppData\...\5z1K7BPqCm.exe.log, CSV
14->160
dropped
162
C:\...verything-1.4.1.1030.x64-Setup.exe, PE32
14->162
dropped
23
Output.exe
6
14->23
started
27
Everything-1.4.1.1030.x64-Setup.exe
1
35
14->27
started
29
shellbag_analyzer_cleaner.exe
3
14->29
started
31
WerFault.exe
17->31
started
process6
file7
134
C:\Users\user\...\WIN CHANGER 3.9.1.exe, PE32
23->134
dropped
136
C:\Users\user\...\LWIN CHANGER 3.9.1.exe, PE32
23->136
dropped
138
C:\Users\user\AppData\Roaming\FixDATA.exe, PE32+
23->138
dropped
140
C:\Users\user\AppData\Roaming\FIx.exe, PE32+
23->140
dropped
220
Multi AV Scanner detection
for dropped file
23->220
222
Uses netsh to modify
the Windows network
and firewall settings
23->222
224
Tries to harvest and
steal WLAN passwords
23->224
33
FixDATA.exe
84
23->33
started
37
FIx.exe
23->37
started
39
WIN CHANGER 3.9.1.exe
14
2
23->39
started
50
3 other processes
23->50
142
C:\Users\user\AppData\Local\...\System.dll, PE32
27->142
dropped
144
C:\Users\user\AppData\Local\...\LangDLL.dll, PE32
27->144
dropped
146
C:\Users\user\AppData\...\InstallOptions.dll, PE32
27->146
dropped
148
2 other files (none is malicious)
27->148
dropped
42
everything.exe
27->42
started
44
Everything.exe
27->44
started
46
conhost.exe
31->46
started
48
powershell.exe
31->48
started
signatures8
process9
dnsIp10
116
C:\Users\user\AppData\Local\Temp\...\rar.exe, PE32+
33->116
dropped
118
C:\Users\user\AppData\Local\...\rarreg.key, ASCII
33->118
dropped
120
C:\Users\user\AppData\...\unicodedata.pyd, PE32+
33->120
dropped
126
65 other files (none is malicious)
33->126
dropped
176
Multi AV Scanner detection
for dropped file
33->176
178
Modifies Windows Defender
protection settings
33->178
180
Adds a directory exclusion
to Windows Defender
33->180
188
3 other signatures
33->188
52
FixDATA.exe
33->52
started
182
Writes to foreign memory
regions
37->182
184
Allocates memory in
foreign processes
37->184
186
Creates a thread in
another existing process
(thread injection)
37->186
56
conhost.exe
37->56
started
172
ip-api.com
208.95.112.1, 49691, 49715, 80
TUT-ASUS
United States
39->172
59
WerFault.exe
39->59
started
122
C:\Program Filesverything\Uninstall.exe, PE32
42->122
dropped
124
C:\Program Filesverythingverything.exe, PE32+
42->124
dropped
61
Everything.exe
42->61
started
file11
signatures12
process13
dnsIp14
170
api.telegram.org
149.154.167.220, 443, 49716
TELEGRAMRU
United Kingdom
52->170
208
Tries to harvest and
steal browser information
(history, passwords,
etc)
52->208
210
Modifies Windows Defender
protection settings
52->210
212
Adds a directory exclusion
to Windows Defender
52->212
218
5 other signatures
52->218
63
cmd.exe
52->63
started
66
cmd.exe
52->66
started
68
cmd.exe
52->68
started
74
19 other processes
52->74
150
C:\Users\user\services64.exe, PE32+
56->150
dropped
214
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
56->214
216
Drops PE files to the
user root directory
56->216
70
cmd.exe
56->70
started
72
cmd.exe
56->72
started
file15
signatures16
process17
signatures18
254
Modifies Windows Defender
protection settings
63->254
256
Removes signatures from
Windows Defender
63->256
87
3 other processes
63->87
258
Adds a directory exclusion
to Windows Defender
66->258
76
powershell.exe
66->76
started
79
conhost.exe
66->79
started
89
2 other processes
68->89
81
services64.exe
70->81
started
83
conhost.exe
70->83
started
260
Suspicious powershell
command line found
72->260
262
Encrypted powershell
cmdline option found
72->262
264
Bypasses PowerShell
execution policy
72->264
266
Uses schtasks.exe or
at.exe to add and modify
task schedules
72->266
91
2 other processes
72->91
268
Tries to harvest and
steal WLAN passwords
74->268
270
Uses WMIC command to
query system information
(often done to detect
virtual machines)
74->270
85
getmac.exe
74->85
started
93
32 other processes
74->93
process19
file20
240
Loading BitLocker PowerShell
Module
76->240
96
WmiPrvSE.exe
76->96
started
242
Multi AV Scanner detection
for dropped file
81->242
244
Writes to foreign memory
regions
81->244
246
Allocates memory in
foreign processes
81->246
248
Creates a thread in
another existing process
(thread injection)
81->248
98
conhost.exe
81->98
started
250
Queries sensitive network
adapter information
(via WMI, Win32_NetworkAdapter,
often done to detect
virtual machines)
85->250
252
Writes or reads registry
keys via WMI
85->252
152
C:\Users\user\AppData\Local\Temp\lC2g3.zip, RAR
93->152
dropped
154
C:\Users\user\AppData\...\dfaninme.cmdline, Unicode
93->154
dropped
102
csc.exe
93->102
started
104
Conhost.exe
93->104
started
signatures21
process22
file23
128
C:\Users\user\AppData\...\sihost64.exe, PE32+
98->128
dropped
130
C:\Users\user\AppData\Roaming\...\WR64.sys, PE32+
98->130
dropped
200
Injects code into the
Windows Explorer (explorer.exe)
98->200
202
Writes to foreign memory
regions
98->202
204
Modifies the context
of a thread in another
process (thread injection)
98->204
206
2 other signatures
98->206
106
sihost64.exe
98->106
started
109
explorer.exe
98->109
started
132
C:\Users\user\AppData\Local\...\dfaninme.dll, PE32
102->132
dropped
112
cvtres.exe
102->112
started
signatures24
process25
dnsIp26
226
Multi AV Scanner detection
for dropped file
106->226
228
Writes to foreign memory
regions
106->228
230
Allocates memory in
foreign processes
106->230
238
2 other signatures
106->238
114
conhost.exe
106->114
started
174
104.243.33.118, 443, 49713
RELIABLESITEUS
United States
109->174
232
System process connects
to network (likely due
to code injection or
exploit)
109->232
234
Query firmware table
information (likely
to detect VMs)
109->234
236
Unusual module load
detection (module proxying)
109->236
signatures27
process28
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.