Threat name:
Blank Grabber, Umbral Stealer, XWorm
Alert
Classification:
troj.adwa.spyw.evad
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Changes security center settings (notifications, updates, antivirus, firewall)
Check if machine is in data center or colocation facility
Connects to a pastebin service (likely for C&C)
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Creates files with lurking names (e.g. Crack.exe)
Drops PE files to the startup folder
Drops PE files with a suspicious file extension
Found direct / indirect Syscall (likely to bypass EDR)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hooks files or directories query functions (used to hide files and directories)
Hooks processes query functions (used to hide processes)
Hooks registry keys query functions (used to hide registry keys)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Modifies power options to not sleep / hibernate
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Modifies Windows Defender protection settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Protects its processes via BreakOnTermination flag
Sample uses string decryption to hide its real strings
Sigma detected: Disable power options
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Powershell Defender Disable Scan Feature
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Stop EventLog
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: Suspicious Startup Folder Persistence
Suricata IDS alerts for network traffic
Suspicious powershell command line found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Uses attrib.exe to hide files
Uses powercfg.exe to modify the power settings
Writes to foreign memory regions
Yara detected Blank Grabber
Yara detected Umbral Stealer
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1794352
Sample:
SeliwareSetup.exe
Startdate:
13/10/2025
Architecture:
WINDOWS
Score:
100
80
pastebin.com
2->80
82
than-location.gl.at.ply.gg
2->82
84
2 other IPs or domains
2->84
94
Suricata IDS alerts
for network traffic
2->94
96
Found malware configuration
2->96
98
Malicious sample detected
(through community Yara
rule)
2->98
102
27 other signatures
2->102
9
SeliwareSetup.exe
11
2->9
started
13
svchost.exe
2->13
started
15
xhzxijsiwmkz.exe
2->15
started
17
2 other processes
2->17
signatures3
100
Connects to a pastebin
service (likely for
C&C)
80->100
process4
file5
74
C:\Users\user\AppData\Local\Temp\Umbral.exe, PE32
9->74
dropped
76
C:\Users\user\AppData\...\SystemSecurity.exe, PE32
9->76
dropped
78
C:\Users\user\AppData\...\MasonHax Crack.exe, PE32+
9->78
dropped
128
Found many strings related
to Crypto-Wallets (likely
being stolen)
9->128
130
Creates files with lurking
names (e.g. Crack.exe)
9->130
132
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
9->132
19
MasonHax Crack.exe
1
2
9->19
started
23
Umbral.exe
15
11
9->23
started
26
SystemSecurity.exe
15
6
9->26
started
134
Changes security center
settings (notifications,
updates, antivirus,
firewall)
13->134
136
Multi AV Scanner detection
for dropped file
15->136
signatures6
process7
dnsIp8
66
C:\ProgramData\...\xhzxijsiwmkz.exe, PE32+
19->66
dropped
104
Modifies the context
of a thread in another
process (thread injection)
19->104
106
Adds a directory exclusion
to Windows Defender
19->106
108
Modifies power options
to not sleep / hibernate
19->108
28
dialer.exe
19->28
started
31
powershell.exe
23
19->31
started
33
cmd.exe
19->33
started
43
14 other processes
19->43
86
discord.com
162.159.138.232, 443, 49725
CLOUDFLARENETUS
United States
23->86
68
C:\ProgramData\Microsoft\...\xaNpI.scr, PE32
23->68
dropped
70
C:\Windows\System32\drivers\etc\hosts, ASCII
23->70
dropped
110
Antivirus detection
for dropped file
23->110
112
Suspicious powershell
command line found
23->112
114
Drops PE files with
a suspicious file extension
23->114
124
5 other signatures
23->124
35
powershell.exe
23->35
started
37
attrib.exe
23->37
started
45
3 other processes
23->45
88
ip-api.com
208.95.112.1, 49718, 49723, 80
TUT-ASUS
United States
26->88
90
than-location.gl.at.ply.gg
147.185.221.229, 25113
SALSGIVERUS
United States
26->90
92
pastebin.com
172.66.171.73, 443, 49724
CLOUDFLARENETUS
United States
26->92
72
C:\Users\user\AppData\...\SystemSecurity.exe, PE32
26->72
dropped
116
Protects its processes
via BreakOnTermination
flag
26->116
118
Bypasses PowerShell
execution policy
26->118
120
Found direct / indirect
Syscall (likely to bypass
EDR)
26->120
122
Contains functionality
to check if a debugger
is running (CheckRemoteDebuggerPresent)
26->122
39
powershell.exe
26->39
started
41
powershell.exe
26->41
started
file9
signatures10
process11
signatures12
138
Injects code into the
Windows Explorer (explorer.exe)
28->138
140
Contains functionality
to inject code into
remote processes
28->140
142
Writes to foreign memory
regions
28->142
146
4 other signatures
28->146
57
12 other processes
28->57
144
Loading BitLocker PowerShell
Module
31->144
47
conhost.exe
31->47
started
60
2 other processes
33->60
49
conhost.exe
35->49
started
51
conhost.exe
37->51
started
53
conhost.exe
39->53
started
55
conhost.exe
41->55
started
62
15 other processes
43->62
64
3 other processes
45->64
process13
signatures14
126
Writes to foreign memory
regions
57->126
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.