Threat name:
Blank Grabber, PureLog Stealer, Xmrig, z
Alert
Classification:
rans.troj.spyw.expl.evad.mine
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus detection for dropped file
Bypasses PowerShell execution policy
Connects to many ports of the same IP (likely port scanning)
Detected Stratum mining protocol
Encrypted powershell cmdline option found
Found many strings related to Crypto-Wallets (likely being stolen)
Found strings related to Crypto-Mining
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies existing user documents (likely ransomware behavior)
Modifies the context of a thread in another process (thread injection)
Modifies Windows Defender protection settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Potentially malicious time measurement code found
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Removes signatures from Windows Defender
Sigma detected: Capture Wi-Fi password
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Powershell Defender Disable Scan Feature
Sigma detected: Rar Usage with Password and Compression Level
Sigma detected: Suspicious Encoded PowerShell Command Line
Sigma detected: Suspicious PowerShell Encoded Command Patterns
Sigma detected: Suspicious Script Execution From Temp Folder
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal WLAN passwords
Tries to steal Crypto Currency Wallets
Uses netsh to modify the Windows network and firewall settings
Uses schtasks.exe or at.exe to add and modify task schedules
Very long command line found
Writes or reads registry keys via WMI
Writes to foreign memory regions
Yara detected Blank Grabber
Yara detected Costura Assembly Loader
Yara detected PureLog Stealer
Yara detected Telegram RAT
Yara detected Xmrig cryptocurrency miner
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1403773
Sample:
JOXwK3xz8r.exe
Startdate:
06/03/2024
Architecture:
WINDOWS
Score:
100
109
dksj.wi-fi.rip
2->109
111
ip-api.com
2->111
113
discord.com
2->113
123
Sigma detected: Xmrig
2->123
125
Malicious sample detected
(through community Yara
rule)
2->125
127
Sigma detected: Capture
Wi-Fi password
2->127
129
18 other signatures
2->129
12
JOXwK3xz8r.exe
4
2->12
started
16
ddfdfdsf.exe
2->16
started
18
ddfdfdsf.exe
2->18
started
signatures3
process4
file5
107
C:\Users\user\AppData\Local\Temp\Built.exe, PE32+
12->107
dropped
185
Writes to foreign memory
regions
12->185
187
Allocates memory in
foreign processes
12->187
189
Modifies the context
of a thread in another
process (thread injection)
12->189
20
Built.exe
22
12->20
started
24
cmd.exe
2
12->24
started
26
vbc.exe
16
2
12->26
started
37
2 other processes
12->37
191
Multi AV Scanner detection
for dropped file
16->191
193
Injects a PE file into
a foreign processes
16->193
29
cmd.exe
16->29
started
31
cmd.exe
16->31
started
33
cmd.exe
16->33
started
35
vbc.exe
16->35
started
signatures6
process7
dnsIp8
91
C:\Users\user\AppData\...\unicodedata.pyd, PE32+
20->91
dropped
93
C:\Users\user\AppData\Local\...\sqlite3.dll, PE32+
20->93
dropped
95
C:\Users\user\AppData\Local\...\select.pyd, PE32+
20->95
dropped
99
16 other malicious files
20->99
dropped
131
Antivirus detection
for dropped file
20->131
133
Very long command line
found
20->133
135
Machine Learning detection
for dropped file
20->135
151
3 other signatures
20->151
39
Built.exe
1
88
20->39
started
137
Suspicious powershell
command line found
24->137
139
Encrypted powershell
cmdline option found
24->139
141
Bypasses PowerShell
execution policy
24->141
153
4 other signatures
24->153
43
conhost.exe
24->43
started
119
dksj.wi-fi.rip
185.196.10.233, 39001, 49729, 49730
SIMPLECARRIERCH
Switzerland
26->119
121
51.81.115.24, 49731, 80
OVHFR
United States
26->121
143
Found many strings related
to Crypto-Wallets (likely
being stolen)
26->143
145
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
26->145
147
Found strings related
to Crypto-Mining
26->147
155
3 other signatures
26->155
45
AddInProcess.exe
26->45
started
47
AddInProcess.exe
26->47
started
49
AddInProcess.exe
26->49
started
55
2 other processes
29->55
51
conhost.exe
31->51
started
53
conhost.exe
33->53
started
97
C:\Users\user\AppData\...\ddfdfdsf.exe, PE32+
37->97
dropped
57
6 other processes
37->57
file9
149
Detected Stratum mining
protocol
119->149
signatures10
process11
dnsIp12
115
ip-api.com
208.95.112.1, 49820, 80
TUT-ASUS
United States
39->115
117
discord.com
162.159.128.233, 443, 49822
CLOUDFLARENETUS
United States
39->117
157
Very long command line
found
39->157
159
Found many strings related
to Crypto-Wallets (likely
being stolen)
39->159
161
Tries to harvest and
steal browser information
(history, passwords,
etc)
39->161
165
6 other signatures
39->165
59
cmd.exe
39->59
started
62
cmd.exe
39->62
started
64
cmd.exe
39->64
started
66
23 other processes
39->66
163
Query firmware table
information (likely
to detect VMs)
45->163
signatures13
process14
signatures15
171
Very long command line
found
59->171
173
Encrypted powershell
cmdline option found
59->173
68
powershell.exe
59->68
started
71
conhost.exe
59->71
started
73
getmac.exe
62->73
started
76
conhost.exe
62->76
started
175
Modifies Windows Defender
protection settings
64->175
177
Removes signatures from
Windows Defender
64->177
179
Suspicious powershell
command line found
66->179
181
Adds a directory exclusion
to Windows Defender
66->181
183
Tries to harvest and
steal WLAN passwords
66->183
78
systeminfo.exe
66->78
started
80
rar.exe
66->80
started
82
conhost.exe
66->82
started
84
43 other processes
66->84
process16
file17
101
C:\Users\user\AppData\...\jzatgiwp.cmdline, Unicode
68->101
dropped
86
csc.exe
68->86
started
167
Queries sensitive network
adapter information
(via WMI, Win32_NetworkAdapter,
often done to detect
virtual machines)
73->167
169
Writes or reads registry
keys via WMI
73->169
103
C:\Users\user\AppData\Local\Temp\ZzYZb.zip, RAR
80->103
dropped
signatures18
process19
file20
105
C:\Users\user\AppData\Local\...\jzatgiwp.dll, PE32
86->105
dropped
89
cvtres.exe
86->89
started
process21
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.url : hxxp://51.81.115.24/custorun23.exe