Analysis
-
max time kernel
74s -
max time network
77s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
26-09-2021 21:14
Static task
static1
Behavioral task
behavioral1
Sample
Mercurial.exe
Resource
win7-en-20210920
windows7_x64
0 signatures
0 seconds
General
-
Target
Mercurial.exe
-
Size
7.9MB
-
MD5
8cad58c674edbe5bafe3a7f3b690e450
-
SHA1
ba629864335ffef2a62808384087deb45342b755
-
SHA256
7900f7e9e009679cb581de76d7535e55ec92ac7aca7074dbdb24c6e28baf7b0e
-
SHA512
e0a5936c75920cd35e2ee96d7810c932a77a5cdc7752e75af660069ba88016cbb75dcd17fe944e86ecdd6083e1066dab4abb4ebd36bb019d81982cc39653a125
Malware Config
Signatures
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Mercurial.exepid process 636 Mercurial.exe 636 Mercurial.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Mercurial.exedescription pid process Token: SeDebugPrivilege 636 Mercurial.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
Mercurial.exedescription pid process target process PID 636 wrote to memory of 368 636 Mercurial.exe nslookup.exe PID 636 wrote to memory of 368 636 Mercurial.exe nslookup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Mercurial.exe"C:\Users\Admin\AppData\Local\Temp\Mercurial.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Windows\system32\nslookup.exenslookup -type=mx 154.61.71.132⤵PID:368
-