Threat name:
Blank Grabber, DCRat, PureLog Stealer, X
Alert
Classification:
rans.spre.troj.spyw.expl.evad.mine
Adds a directory exclusion to Windows Defender
AI detected suspicious sample
Antivirus detection for dropped file
Bypasses PowerShell execution policy
Creates an autostart registry key pointing to binary in C:\Windows
Creates an undocumented autostart registry key
Creates autostart registry keys with suspicious values (likely registry only malware)
Creates multiple autostart registry keys
Creates processes via WMI
Drops PE files with benign system names
Encrypted powershell cmdline option found
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hooks files or directories query functions (used to hide files and directories)
Hooks processes query functions (used to hide processes)
Hooks registry keys query functions (used to hide registry keys)
Infects executable files (exe, dll, sys, html)
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies existing user documents (likely ransomware behavior)
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Modifies Windows Defender protection settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Removes signatures from Windows Defender
Sigma detected: Capture Wi-Fi password
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Powershell Defender Disable Scan Feature
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Stop multiple services
Sigma detected: Suspicious Encoded PowerShell Command Line
Sigma detected: Suspicious PowerShell Encoded Command Patterns
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: Suspicious Startup Folder Persistence
Sigma detected: System File Execution Location Anomaly
Sigma detected: Windows Binaries Write Suspicious Extensions
Sigma detected: WScript or CScript Dropper
Stops critical windows services
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal WLAN passwords
Tries to steal Crypto Currency Wallets
Uses netsh to modify the Windows network and firewall settings
Uses the Telegram API (likely for C&C communication)
Very long command line found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes or reads registry keys via WMI
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected Blank Grabber
Yara detected PureLog Stealer
Yara detected Telegram RAT
Yara detected Xmrig cryptocurrency miner
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1485736
Sample:
8Ck8T5qRcC.exe
Startdate:
01/08/2024
Architecture:
WINDOWS
Score:
100
158
api.telegram.org
2->158
160
discord.com
2->160
162
ip-api.com
2->162
200
Found malware configuration
2->200
202
Antivirus detection
for dropped file
2->202
204
Sigma detected: Capture
Wi-Fi password
2->204
208
29 other signatures
2->208
15
8Ck8T5qRcC.exe
6
2->15
started
18
HpQPPZazcv.exe
2->18
started
22
powershell.exe
2->22
started
24
2 other processes
2->24
signatures3
206
Uses the Telegram API
(likely for C&C
communication)
158->206
process4
dnsIp5
134
C:\ProgramData\Microsoft\hacn.exe, PE32+
15->134
dropped
136
C:\ProgramData\Microsoft\based.exe, PE32+
15->136
dropped
26
hacn.exe
13
15->26
started
30
based.exe
22
15->30
started
164
194.58.42.154, 49739, 49740, 49741
AS-REGRU
Russian Federation
18->164
138
C:\Users\user\Desktop\xiBLBWku.log, PE32
18->138
dropped
140
C:\Users\user\Desktop\tcMmcUQx.log, PE32
18->140
dropped
142
C:\Users\user\Desktop\tKFUOyWv.log, PE32
18->142
dropped
144
19 other malicious files
18->144
dropped
210
Antivirus detection
for dropped file
18->210
212
Multi AV Scanner detection
for dropped file
18->212
214
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
18->214
220
3 other signatures
18->220
216
Loading BitLocker PowerShell
Module
22->216
32
conhost.exe
22->32
started
218
Found direct / indirect
Syscall (likely to bypass
EDR)
24->218
34
conhost.exe
24->34
started
36
sc.exe
24->36
started
38
sc.exe
24->38
started
40
3 other processes
24->40
file6
signatures7
process8
file9
106
C:\Users\user\AppData\...\unicodedata.pyd, PE32+
26->106
dropped
108
C:\Users\user\AppData\Local\...\select.pyd, PE32+
26->108
dropped
110
C:\Users\user\AppData\Local\Temp\...\s.exe, PE32
26->110
dropped
118
8 other files (7 malicious)
26->118
dropped
228
Multi AV Scanner detection
for dropped file
26->228
230
Machine Learning detection
for dropped file
26->230
42
hacn.exe
26->42
started
112
C:\Users\user\AppData\...\unicodedata.pyd, PE32+
30->112
dropped
114
C:\Users\user\AppData\Local\...\sqlite3.dll, PE32+
30->114
dropped
116
C:\Users\user\AppData\Local\...\select.pyd, PE32+
30->116
dropped
120
16 other files (15 malicious)
30->120
dropped
232
Very long command line
found
30->232
234
Modifies Windows Defender
protection settings
30->234
236
Adds a directory exclusion
to Windows Defender
30->236
238
2 other signatures
30->238
44
based.exe
1
101
30->44
started
signatures10
process11
dnsIp12
48
cmd.exe
1
42->48
started
166
api.telegram.org
149.154.167.220, 443, 49748
TELEGRAMRU
United Kingdom
44->166
168
discord.com
162.159.136.232, 443, 49747
CLOUDFLARENETUS
United States
44->168
170
ip-api.com
208.95.112.1, 49744, 80
TUT-ASUS
United States
44->170
250
Found many strings related
to Crypto-Wallets (likely
being stolen)
44->250
252
Tries to harvest and
steal browser information
(history, passwords,
etc)
44->252
254
Modifies Windows Defender
protection settings
44->254
256
5 other signatures
44->256
51
cmd.exe
44->51
started
53
cmd.exe
44->53
started
55
cmd.exe
44->55
started
57
14 other processes
44->57
signatures13
process14
signatures15
172
Wscript starts Powershell
(via cmd or directly)
48->172
174
Very long command line
found
48->174
176
Encrypted powershell
cmdline option found
48->176
184
3 other signatures
48->184
59
s.exe
5
48->59
started
63
conhost.exe
48->63
started
73
2 other processes
51->73
178
Adds a directory exclusion
to Windows Defender
53->178
65
powershell.exe
53->65
started
67
conhost.exe
53->67
started
180
Modifies Windows Defender
protection settings
55->180
75
2 other processes
55->75
182
Tries to harvest and
steal WLAN passwords
57->182
69
getmac.exe
57->69
started
71
powershell.exe
57->71
started
77
23 other processes
57->77
process16
file17
122
C:\ProgramData\svchost.exe, PE32
59->122
dropped
124
C:\ProgramData\setup.exe, PE32+
59->124
dropped
240
Multi AV Scanner detection
for dropped file
59->240
242
Drops PE files with
benign system names
59->242
79
svchost.exe
59->79
started
83
setup.exe
59->83
started
244
Loading BitLocker PowerShell
Module
65->244
246
Queries sensitive network
adapter information
(via WMI, Win32_NetworkAdapter,
often done to detect
virtual machines)
69->246
248
Writes or reads registry
keys via WMI
69->248
85
csc.exe
73->85
started
signatures18
process19
file20
146
C:\Users\user\...\ChainComServermonitor.exe, PE32
79->146
dropped
148
pFG3Duil1NAbFHoInF...Rvb98S0ewJA0VkW.vbe, data
79->148
dropped
150
C:\Users\user\...\oGgyulsi03j6EO3sjCC.bat, ASCII
79->150
dropped
186
Antivirus detection
for dropped file
79->186
188
Multi AV Scanner detection
for dropped file
79->188
190
Machine Learning detection
for dropped file
79->190
87
wscript.exe
79->87
started
152
C:\Users\user\AppData\...\wxyubnjmnlae.tmp, PE32+
83->152
dropped
154
C:\Program Filesbehaviorgraphoogle\Chrome\updater.exe, PE32+
83->154
dropped
192
Writes to foreign memory
regions
83->192
194
Modifies the context
of a thread in another
process (thread injection)
83->194
196
Found hidden mapped
module (file has been
removed from disk)
83->196
198
3 other signatures
83->198
156
C:\Users\user\AppData\Local\...\eodmidm4.dll, PE32
85->156
dropped
90
cvtres.exe
85->90
started
signatures21
process22
signatures23
224
Wscript starts Powershell
(via cmd or directly)
87->224
226
Windows Scripting host
queries suspicious COM
object (likely to drop
second stage)
87->226
92
cmd.exe
87->92
started
process24
process25
94
ChainComServermonitor.exe
92->94
started
98
conhost.exe
92->98
started
file26
126
C:\Windows\Prefetch\HpQPPZazcv.exe, PE32
94->126
dropped
128
C:\Users\user\Desktop\xnytOABw.log, PE32
94->128
dropped
130
C:\Users\user\Desktop\xGttiZnp.log, PE32
94->130
dropped
132
26 other malicious files
94->132
dropped
258
Multi AV Scanner detection
for dropped file
94->258
260
Creates an undocumented
autostart registry key
94->260
262
Creates autostart registry
keys with suspicious
values (likely registry
only malware)
94->262
264
5 other signatures
94->264
100
csc.exe
94->100
started
signatures27
process28
file29
104
C:\Windows\...\SecurityHealthSystray.exe, PE32
100->104
dropped
222
Infects executable files
(exe, dll, sys, html)
100->222
signatures30
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.