Analysis

  • max time kernel
    140s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    11-02-2022 23:45

General

  • Target

    d934d04fccac52d6f8ddceaceb608f3bec116928a7c0a2552b57861d465e7e13.exe

  • Size

    41KB

  • MD5

    71b818d8192d62a082a0dabb7962e76a

  • SHA1

    ccb9744d66df57605dfe6c23bf73164da7ae9abb

  • SHA256

    d934d04fccac52d6f8ddceaceb608f3bec116928a7c0a2552b57861d465e7e13

  • SHA512

    86b64f98a407af3837021486a1e4cc310622c34d764e471c15547252a31598d007d34f2ba71ddc3d3cc5d7ba802d76754611cf681ae427ec45face49bfea52e0

Malware Config

Signatures

  • Mercurial Grabber Stealer

    Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

  • Looks for VirtualBox Guest Additions in registry 2 TTPs
  • Looks for VMWare Tools registry key 2 TTPs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in Windows directory 8 IoCs
  • Checks SCSI registry key(s) 3 TTPs 1 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d934d04fccac52d6f8ddceaceb608f3bec116928a7c0a2552b57861d465e7e13.exe
    "C:\Users\Admin\AppData\Local\Temp\d934d04fccac52d6f8ddceaceb608f3bec116928a7c0a2552b57861d465e7e13.exe"
    1⤵
    • Checks BIOS information in registry
    • Maps connected drives based on registry
    • Checks SCSI registry key(s)
    • Enumerates system info in registry
    PID:3512
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:3432
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:4404

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3432-131-0x0000025E96190000-0x0000025E961A0000-memory.dmp

    Filesize

    64KB

  • memory/3432-132-0x0000025E96720000-0x0000025E96730000-memory.dmp

    Filesize

    64KB

  • memory/3432-133-0x0000025E98E10000-0x0000025E98E14000-memory.dmp

    Filesize

    16KB

  • memory/3512-130-0x0000000000940000-0x0000000000950000-memory.dmp

    Filesize

    64KB