| File name: | NanoCore_1.2.2.0.zip |
| Full analysis: | https://app.any.run/tasks/718b6e19-8ee2-4cee-bb17-c00c5535012c |
| Verdict: | Malicious activity |
| Threats: | Blank Grabber is an infostealer written in Python. It is designed to steal a wide array of data, such as browser login credentials, crypto wallets, Telegram sessions, and Discord tokens. It is an open-source malware, with its code available on GitHub and regularly receiving updates. Blank Grabber builder’s simple interface lets threat actors even with basic skills to deploy it and conduct attacks. |
| Analysis date: | September 15, 2024, 04:58:31 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/zip |
| File info: | Zip archive data, at least v2.0 to extract, compression method=deflate |
| MD5: | 8444E1DB6FF3EDC0FA2E4849F971EBBC |
| SHA1: | 9812681EE2E89C87F3314D4FA1C24B14806B14A8 |
| SHA256: | 6B52BD3A456800483DEEBACBF2E029D0A8599693E99758A2F2D0687AC405D21C |
| SSDEEP: | 98304:Lu2m3xWjlpUtVN5SsDwGiEUCCLZvHbDWeY0UAGhrgS0SNAHQLGt1dj0FzCpiCWPV:zeg10m5KqyPNQTfi63jkeZC0u |
| .zip | | | ZIP compressed archive (100) |
|---|
| ZipRequiredVersion: | 20 |
|---|---|
| ZipBitFlag: | - |
| ZipCompression: | Deflated |
| ZipModifyDate: | 2024:08:11 09:37:24 |
| ZipCRC: | 0xfae0ba02 |
| ZipCompressedSize: | 15075741 |
| ZipUncompressedSize: | 15209580 |
| ZipFileName: | NanoCore_1.2.2.0/NanoCore_1.2.2.0.exe |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 488 | powershell Get-Clipboard | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows PowerShell Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 736 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1084 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1224 | "C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\NanoCore_1.2.2.0.zip | C:\Program Files\WinRAR\WinRAR.exe | — | explorer.exe | |||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Exit code: 0 Version: 5.91.0 Modules
| |||||||||||||||
| 1280 | "C:\Users\admin\AppData\Local\Temp\crack.exe" | C:\Users\admin\AppData\Local\Temp\crack.exe | crack.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: MDMAgent Exit code: 0 Version: 10.0.22621.2506 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1344 | wmic path win32_VideoController get name | C:\Windows\System32\wbem\WMIC.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: WMI Commandline Utility Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1436 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1440 | tree /A /F | C:\Windows\System32\tree.com | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Tree Walk Utility Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1636 | "C:\Users\admin\AppData\Local\Temp\crack.exe" C:\Users\admin\AppData\Local\Temp\crack.exe | C:\Users\admin\AppData\Local\Temp\crack.exe | — | crack.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: MDMAgent Exit code: 0 Version: 10.0.22621.2506 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1748 | C:\WINDOWS\system32\cmd.exe /c "tasklist /FO LIST" | C:\Windows\System32\cmd.exe | — | crack.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (1224) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\GoogleChromeEnterpriseBundle64.zip | |||
| (PID) Process: | (1224) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\Desktop\NanoCore_1.2.2.0.zip | |||
| (PID) Process: | (1224) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (1224) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (1224) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (1224) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (1224) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\MainWin |
| Operation: | write | Name: | Placement |
Value: 2C0000000200000003000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF3D0000002D000000FD03000016020000 | |||
| (PID) Process: | (1224) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths |
| Operation: | write | Name: | name |
Value: 256 | |||
| (PID) Process: | (1224) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (1224) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths |
| Operation: | write | Name: | psize |
Value: 80 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 7024 | NanoCore_1.2.2.0.exe | C:\Users\admin\Desktop\NanoCore_1.2.2.0\Resources\Themes\Default.xml | xml | |
MD5:66BED75987DFF3835A4AB05E61E619EF | SHA256:193DA22D8E0F6431CA6CCD4490C122BE113DBBAACDB973B4F1C8572A461A8047 | |||
| 7024 | NanoCore_1.2.2.0.exe | C:\Users\admin\Desktop\NanoCore_1.2.2.0\Resources\Themes\Classic.xml | xml | |
MD5:769E96DFDE51FF03A4A1B6F1B7A6F0D9 | SHA256:F35CCB8A314F11EE46668D08528F6F21F02BC7E8D5716C838623C9F0ECC557E9 | |||
| 5796 | WinRAR.exe | C:\Users\admin\Desktop\NanoCore_1.2.2.0\NanoCore_1.2.2.0.exe | executable | |
MD5:9F0245A3C5E691126F42EE5BB1BC1A40 | SHA256:F53F62A9093F8AF6FD63F1284E2E264343E9E54080DD7345B8F0247FCA8C80B4 | |||
| 7024 | NanoCore_1.2.2.0.exe | C:\Users\admin\Desktop\NanoCore_1.2.2.0\Resources\Themes\Ember.xml | xml | |
MD5:5DB56C0FB5A2BD0B51E4A16D62FD22D4 | SHA256:F4F2410031FE6C41FB7DC01E1AE46CFFBF226E839722C6ECB8991C485193B6C6 | |||
| 7024 | NanoCore_1.2.2.0.exe | C:\Users\admin\Desktop\NanoCore_1.2.2.0\ClientPlugin.xml | xml | |
MD5:5D0381A56563B1CA8928E3CF087F1625 | SHA256:0497B92461C2A9CE3101D9397FB3079F60979164336A16653D282273D3085BCC | |||
| 5796 | WinRAR.exe | C:\Users\admin\Desktop\NanoCore_1.2.2.0\Password.txt | text | |
MD5:74C1D4C44F8B390B493A4328332D079B | SHA256:D62B8A03A0EE992D25266B477ED200B15F7AF793319A5A914B9FBC4680E1BAB6 | |||
| 7024 | NanoCore_1.2.2.0.exe | C:\Users\admin\Desktop\NanoCore_1.2.2.0\Exceptions\Server\1.2.2.0\f739a9d34beac42d55c5ae90e14e54f8.log | text | |
MD5:F739A9D34BEAC42D55C5AE90E14E54F8 | SHA256:EADFAAD62CA5015686CCE060C9B015F4BD3A4A662D5F7151D91C672C3DCECFAE | |||
| 7024 | NanoCore_1.2.2.0.exe | C:\Users\admin\Desktop\NanoCore_1.2.2.0\Resources\Themes\Terminus.xml | xml | |
MD5:0E74131700FDA404D96EAF7ECEB279F4 | SHA256:32F80F9434A1D137CFEB2ED9850C4A900165ABBFED2269533C0FC8CE5481D7CA | |||
| 7024 | NanoCore_1.2.2.0.exe | C:\Users\admin\Desktop\NanoCore_1.2.2.0\ServerPlugin.xml | xml | |
MD5:8245E02B3A884C86E66791879FB79A28 | SHA256:3CF9CC86656B3719555E76B9F86D1765BC700C6A9A8228539F0521AF96E81CDA | |||
| 7024 | NanoCore_1.2.2.0.exe | C:\Users\admin\Desktop\NanoCore_1.2.2.0\Resources\Themes\Venom.xml | xml | |
MD5:9895CAA6689F649AA4C16EA00C010AA6 | SHA256:F8701D3C100E6DA867C66D58EEC2D20519D9383DCD0CB3B3F14176CEF54E69CF | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2120 | MoUsoCoreWorker.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
3332 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
3332 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
1776 | svchost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
6176 | crack.exe | GET | 200 | 208.95.112.1:80 | http://ip-api.com/json/?fields=225545 | unknown | — | — | shared |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
6440 | svchost.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
6280 | RUXIMICS.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
— | — | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
2120 | MoUsoCoreWorker.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
3888 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
— | — | 40.113.110.67:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1776 | svchost.exe | 40.126.32.134:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
1776 | svchost.exe | 192.229.221.95:80 | ocsp.digicert.com | EDGECAST | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
gstatic.com |
| whitelisted |
lazyshare.net |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
2256 | svchost.exe | Device Retrieving External IP Address Detected | INFO [ANY.RUN] External IP Check (ip-api .com) |
2256 | svchost.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com) |
2256 | svchost.exe | Misc activity | SUSPICIOUS [ANY.RUN] Possible sending an external IP address to Telegram |
6176 | crack.exe | Device Retrieving External IP Address Detected | ET POLICY External IP Lookup ip-api.com |
2256 | svchost.exe | Misc activity | ET HUNTING Telegram API Domain in DNS Lookup |
6176 | crack.exe | A Network Trojan was detected | STEALER [ANY.RUN] BlankGrabber (SkochGrabber) Generic External IP Check |
6176 | crack.exe | Misc activity | ET HUNTING Observed Telegram API Domain (api .telegram .org in TLS SNI) |
Process | Message |
|---|---|
crack.exe | Invalid parameter passed to C runtime function.
|
crack.exe | Invalid parameter passed to C runtime function.
|
crack.exe | Invalid parameter passed to C runtime function.
|
crack.exe | Invalid parameter passed to C runtime function.
|
crack.exe | Invalid parameter passed to C runtime function.
|
crack.exe | Invalid parameter passed to C runtime function.
|
crack.exe | Invalid parameter passed to C runtime function.
|
crack.exe | Invalid parameter passed to C runtime function.
|
NanoCore.exe | Trying to load native SQLite library "C:\Users\admin\Desktop\NanoCore_1.2.2.0\x86\SQLite.Interop.dll"...
|