Analysis
-
max time kernel
78s -
max time network
38s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
26-09-2021 21:14
Static task
static1
Behavioral task
behavioral1
Sample
Mercurial.exe
Resource
win7-en-20210920
windows7_x64
0 signatures
0 seconds
General
-
Target
Mercurial.exe
-
Size
7.9MB
-
MD5
8cad58c674edbe5bafe3a7f3b690e450
-
SHA1
ba629864335ffef2a62808384087deb45342b755
-
SHA256
7900f7e9e009679cb581de76d7535e55ec92ac7aca7074dbdb24c6e28baf7b0e
-
SHA512
e0a5936c75920cd35e2ee96d7810c932a77a5cdc7752e75af660069ba88016cbb75dcd17fe944e86ecdd6083e1066dab4abb4ebd36bb019d81982cc39653a125
Malware Config
Signatures
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Mercurial.exepid process 2032 Mercurial.exe 2032 Mercurial.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Mercurial.exedescription pid process Token: SeDebugPrivilege 2032 Mercurial.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Mercurial.exedescription pid process target process PID 2032 wrote to memory of 1452 2032 Mercurial.exe nslookup.exe PID 2032 wrote to memory of 1452 2032 Mercurial.exe nslookup.exe PID 2032 wrote to memory of 1452 2032 Mercurial.exe nslookup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Mercurial.exe"C:\Users\Admin\AppData\Local\Temp\Mercurial.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\system32\nslookup.exenslookup -type=mx 154.61.71.512⤵PID:1452
-