Threat name:
Blank Grabber, Skuld Stealer, XWorm
Alert
Classification:
rans.troj.adwa.spyw.expl.evad
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Check if machine is in data center or colocation facility
Creates multiple autostart registry keys
Encrypted powershell cmdline option found
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Installs new ROOT certificates
Loading BitLocker PowerShell Module
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies existing user documents (likely ransomware behavior)
Modifies Windows Defender protection settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Protects its processes via BreakOnTermination flag
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Removes signatures from Windows Defender
Sample uses string decryption to hide its real strings
Sigma detected: Bypass UAC via Fodhelper.exe
Sigma detected: Capture Wi-Fi password
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Powershell Defender Disable Scan Feature
Sigma detected: Suspicious Encoded PowerShell Command Line
Sigma detected: Suspicious PowerShell Encoded Command Patterns
Sigma detected: Suspicious Startup Folder Persistence
Suricata IDS alerts for network traffic
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal WLAN passwords
Tries to steal Crypto Currency Wallets
UAC bypass detected (Fodhelper)
Uses cmd line tools excessively to alter registry or file data
Uses netsh to modify the Windows network and firewall settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes or reads registry keys via WMI
Writes to foreign memory regions
Yara detected Blank Grabber
Yara detected Skuld Stealer
Yara detected Telegram RAT
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1557106
Sample:
EternalPredictor.exe
Startdate:
17/11/2024
Architecture:
WINDOWS
Score:
100
117
ip-api.com
2->117
119
api.ipify.org
2->119
121
discord.com
2->121
131
Suricata IDS alerts
for network traffic
2->131
133
Found malware configuration
2->133
135
Malicious sample detected
(through community Yara
rule)
2->135
137
22 other signatures
2->137
12
EternalPredictor.exe
5
2->12
started
15
SecurityHealthSystray.exe
2->15
started
18
XClient.exe
2->18
started
20
XClient.exe
2->20
started
signatures3
process4
file5
109
C:\Users\user\AppData\Roaming\skuld.exe, PE32+
12->109
dropped
111
C:\Users\user\AppData\Roaming\program.exe, PE32+
12->111
dropped
113
C:\Users\user\AppData\Roaming\eternal.exe, PE32
12->113
dropped
115
C:\Users\user\...ternalPredictor.exe.log, CSV
12->115
dropped
22
program.exe
22
12->22
started
26
skuld.exe
2
2
12->26
started
29
eternal.exe
1
6
12->29
started
191
Multi AV Scanner detection
for dropped file
15->191
193
UAC bypass detected
(Fodhelper)
15->193
31
cmd.exe
15->31
started
33
conhost.exe
15->33
started
signatures6
process7
dnsIp8
95
C:\Users\user\AppData\Local\...\rarreg.key, ASCII
22->95
dropped
97
C:\Users\user\AppData\...\unicodedata.pyd, PE32+
22->97
dropped
99
C:\Users\user\AppData\Local\...\sqlite3.dll, PE32+
22->99
dropped
105
16 other files (none is malicious)
22->105
dropped
153
Multi AV Scanner detection
for dropped file
22->153
155
Modifies Windows Defender
protection settings
22->155
157
Adds a directory exclusion
to Windows Defender
22->157
173
2 other signatures
22->173
35
program.exe
1
108
22->35
started
125
ip-api.com
208.95.112.1, 49707, 49716, 49717
TUT-ASUS
United States
26->125
127
api.ipify.org
172.67.74.152, 443, 49706
CLOUDFLARENETUS
United States
26->127
101
C:\Users\user\...\SecurityHealthSystray.exe, PE32+
26->101
dropped
159
Installs new ROOT certificates
26->159
161
Found many strings related
to Crypto-Wallets (likely
being stolen)
26->161
163
Uses cmd line tools
excessively to alter
registry or file data
26->163
39
conhost.exe
26->39
started
41
attrib.exe
1
26->41
started
43
attrib.exe
1
26->43
started
45
WMIC.exe
26->45
started
129
147.185.221.23, 33942, 49709, 49712
SALSGIVERUS
United States
29->129
103
C:\Users\user\AppData\Roaming\XClient.exe, PE32
29->103
dropped
165
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
29->165
167
Protects its processes
via BreakOnTermination
flag
29->167
169
Creates multiple autostart
registry keys
29->169
171
Uses schtasks.exe or
at.exe to add and modify
task schedules
29->171
47
schtasks.exe
29->47
started
49
fodhelper.exe
31->49
started
51
fodhelper.exe
31->51
started
53
fodhelper.exe
31->53
started
file9
signatures10
process11
dnsIp12
123
discord.com
162.159.128.233, 443, 49718
CLOUDFLARENETUS
United States
35->123
139
Tries to harvest and
steal browser information
(history, passwords,
etc)
35->139
141
Modifies Windows Defender
protection settings
35->141
143
Modifies the hosts file
35->143
145
5 other signatures
35->145
55
cmd.exe
35->55
started
58
cmd.exe
35->58
started
60
cmd.exe
35->60
started
66
23 other processes
35->66
62
conhost.exe
47->62
started
64
SecurityHealthSystray.exe
49->64
started
signatures13
process14
signatures15
175
Suspicious powershell
command line found
55->175
177
Uses cmd line tools
excessively to alter
registry or file data
55->177
179
Encrypted powershell
cmdline option found
55->179
189
2 other signatures
55->189
68
powershell.exe
55->68
started
71
conhost.exe
55->71
started
181
Modifies Windows Defender
protection settings
58->181
73
powershell.exe
58->73
started
75
conhost.exe
58->75
started
183
Adds a directory exclusion
to Windows Defender
60->183
77
powershell.exe
60->77
started
79
conhost.exe
60->79
started
81
conhost.exe
64->81
started
185
Writes to foreign memory
regions
66->185
187
Tries to harvest and
steal WLAN passwords
66->187
83
getmac.exe
66->83
started
85
42 other processes
66->85
process16
file17
147
Loading BitLocker PowerShell
Module
68->147
149
Queries sensitive network
adapter information
(via WMI, Win32_NetworkAdapter,
often done to detect
virtual machines)
83->149
151
Writes or reads registry
keys via WMI
83->151
93
C:\Users\user\AppData\...\3pyiazzo.cmdline, Unicode
85->93
dropped
88
csc.exe
85->88
started
signatures18
process19
file20
107
C:\Users\user\AppData\Local\...\3pyiazzo.dll, PE32
88->107
dropped
91
cvtres.exe
88->91
started
process21
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.