Analysis
-
max time kernel
92s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 16:58
Static task
static1
Behavioral task
behavioral1
Sample
1ea3b43e8a8ce761479e26f94ccf9bd5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1ea3b43e8a8ce761479e26f94ccf9bd5.exe
Resource
win10v2004-20220812-en
General
-
Target
1ea3b43e8a8ce761479e26f94ccf9bd5.exe
-
Size
8.8MB
-
MD5
1ea3b43e8a8ce761479e26f94ccf9bd5
-
SHA1
5936e36c3dd39216803c72e0841da6f6df256291
-
SHA256
5fe32142dcc57fbdf2a827abcbf92f22d0e6b84aeb1d94f7a3c1c9f674d7567b
-
SHA512
c3bfcb88839ee2d3eedda32fbdd72dbc6b29ccf8217a265eb3edd19a0b4259a273343035296ac8b34d72bcdcd28697dee509107eb99f8cd6a59bb046dbee4e59
-
SSDEEP
196608:dCdbOITPSUUpIS9u/pRDXvQhAJ4TsHhGgXZQWYhr5bi:WjTPlcI1XDXv8A2TsBGgX
Malware Config
Extracted
mercurialgrabber
https://discord.com/api/webhooks/835255995735343134/XNe_EsIHeOwVdqPUaV7pv4uxkib5RHnv_Tn6JCr4hEBupeIfyQN2tRINJsXKij_tI_Ec
Signatures
-
Matiex Main payload 3 IoCs
resource yara_rule behavioral2/files/0x0006000000022e0d-142.dat family_matiex behavioral2/files/0x0006000000022e0d-141.dat family_matiex behavioral2/memory/740-145-0x0000000000420000-0x0000000000496000-memory.dmp family_matiex -
Mercurial Grabber Stealer
Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.
-
Executes dropped EXE 4 IoCs
pid Process 4912 msvcp140.exe 3296 vcruntime140.exe 740 ffmpeg.exe 1700 modest-menu.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 1ea3b43e8a8ce761479e26f94ccf9bd5.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\%nmoufstr%.url ffmpeg.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ffmpeg.exe Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ffmpeg.exe Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ffmpeg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 8 ip4.seeip.org 10 checkip.dyndns.org 12 freegeoip.app 13 freegeoip.app 31 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4704 740 WerFault.exe 86 4228 3296 WerFault.exe 84 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString vcruntime140.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 vcruntime140.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 1ea3b43e8a8ce761479e26f94ccf9bd5.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\ms-settings\shell\open\command ffmpeg.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\ms-settings ffmpeg.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\ms-settings\shell ffmpeg.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\ms-settings\shell\open ffmpeg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\ms-settings\shell\open\command\ ffmpeg.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 2124 PING.EXE 1504 PING.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3904 1ea3b43e8a8ce761479e26f94ccf9bd5.exe 3904 1ea3b43e8a8ce761479e26f94ccf9bd5.exe 1700 modest-menu.exe 1700 modest-menu.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3904 1ea3b43e8a8ce761479e26f94ccf9bd5.exe Token: SeDebugPrivilege 3296 vcruntime140.exe Token: SeDebugPrivilege 1700 modest-menu.exe Token: SeDebugPrivilege 740 ffmpeg.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3904 wrote to memory of 4912 3904 1ea3b43e8a8ce761479e26f94ccf9bd5.exe 82 PID 3904 wrote to memory of 4912 3904 1ea3b43e8a8ce761479e26f94ccf9bd5.exe 82 PID 3904 wrote to memory of 4912 3904 1ea3b43e8a8ce761479e26f94ccf9bd5.exe 82 PID 3904 wrote to memory of 3296 3904 1ea3b43e8a8ce761479e26f94ccf9bd5.exe 84 PID 3904 wrote to memory of 3296 3904 1ea3b43e8a8ce761479e26f94ccf9bd5.exe 84 PID 3904 wrote to memory of 740 3904 1ea3b43e8a8ce761479e26f94ccf9bd5.exe 86 PID 3904 wrote to memory of 740 3904 1ea3b43e8a8ce761479e26f94ccf9bd5.exe 86 PID 3904 wrote to memory of 740 3904 1ea3b43e8a8ce761479e26f94ccf9bd5.exe 86 PID 3904 wrote to memory of 1700 3904 1ea3b43e8a8ce761479e26f94ccf9bd5.exe 87 PID 3904 wrote to memory of 1700 3904 1ea3b43e8a8ce761479e26f94ccf9bd5.exe 87 PID 3904 wrote to memory of 1168 3904 1ea3b43e8a8ce761479e26f94ccf9bd5.exe 88 PID 3904 wrote to memory of 1168 3904 1ea3b43e8a8ce761479e26f94ccf9bd5.exe 88 PID 1168 wrote to memory of 2124 1168 cmd.exe 90 PID 1168 wrote to memory of 2124 1168 cmd.exe 90 PID 1168 wrote to memory of 1504 1168 cmd.exe 91 PID 1168 wrote to memory of 1504 1168 cmd.exe 91 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ffmpeg.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ffmpeg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ea3b43e8a8ce761479e26f94ccf9bd5.exe"C:\Users\Admin\AppData\Local\Temp\1ea3b43e8a8ce761479e26f94ccf9bd5.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Users\Admin\AppData\Local\Temp\msvcp140.exe"C:\Users\Admin\AppData\Local\Temp\msvcp140.exe"2⤵
- Executes dropped EXE
PID:4912
-
-
C:\Users\Admin\AppData\Local\Temp\vcruntime140.exe"C:\Users\Admin\AppData\Local\Temp\vcruntime140.exe"2⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:3296 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3296 -s 20523⤵
- Program crash
PID:4228
-
-
-
C:\Users\Admin\AppData\Local\Temp\ffmpeg.exe"C:\Users\Admin\AppData\Local\Temp\ffmpeg.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Accesses Microsoft Outlook profiles
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:740 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 740 -s 21443⤵
- Program crash
PID:4704
-
-
-
C:\Users\Admin\AppData\Local\Temp\modest-menu.exe"C:\Users\Admin\AppData\Local\Temp\modest-menu.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1700
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 100 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\1ea3b43e8a8ce761479e26f94ccf9bd5.exe"& ping 1.1.1.1 -n 1 -w 900 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\1ea3b43e8a8ce761479e26f94ccf9bd5.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 1003⤵
- Runs ping.exe
PID:2124
-
-
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 9003⤵
- Runs ping.exe
PID:1504
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 740 -ip 7401⤵PID:2356
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 428 -p 3296 -ip 32961⤵PID:2464
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
448KB
MD578942c6e318b0c460c37069695742d4a
SHA1fc31e2c1887f95d19d8331ff0945688c7fec32c5
SHA256c749d39cf57c5ffb8ed18aaf961ad571e0a698c424ec07bf6c9fad3ae407425c
SHA5120bcf7dc7e7a2354b0a23e60ec477adf8003a22d7833c302fc7bceb72d59281bbec3d225c01b21888cd01310702bec12d08e3d4f283abd3d0c607619bf9bd9f8d
-
Filesize
448KB
MD578942c6e318b0c460c37069695742d4a
SHA1fc31e2c1887f95d19d8331ff0945688c7fec32c5
SHA256c749d39cf57c5ffb8ed18aaf961ad571e0a698c424ec07bf6c9fad3ae407425c
SHA5120bcf7dc7e7a2354b0a23e60ec477adf8003a22d7833c302fc7bceb72d59281bbec3d225c01b21888cd01310702bec12d08e3d4f283abd3d0c607619bf9bd9f8d
-
Filesize
8.7MB
MD513e5efd3938a8fedcfb0820e5593dc4e
SHA13376481dda6c0349a2a377a98434b30d9f2bde20
SHA256e56c11e2ca383b47312ffe202c0fb7defb89bf8b303d67359a282f0a994ca92c
SHA512d944adc95fc8230a11724e355ea8ac8ddfaf8373f5a7ab622ac9c7015bd1abb0aca64b9ead957f83994a73000cf2856f80bb61f944334d3b09b0de229d1452cd
-
Filesize
8.7MB
MD513e5efd3938a8fedcfb0820e5593dc4e
SHA13376481dda6c0349a2a377a98434b30d9f2bde20
SHA256e56c11e2ca383b47312ffe202c0fb7defb89bf8b303d67359a282f0a994ca92c
SHA512d944adc95fc8230a11724e355ea8ac8ddfaf8373f5a7ab622ac9c7015bd1abb0aca64b9ead957f83994a73000cf2856f80bb61f944334d3b09b0de229d1452cd
-
Filesize
8KB
MD5324c2e555431e860fac2b2bfc04adb1d
SHA1c1f4215f0452f1d96c92ee324bc2cef999294874
SHA256cb2079641bb1bac84ed28836bb03817e09017553e412e26d166673459ad4c688
SHA51207fac78b65341498eaea79e46bdeed74d516db58d66c03b6a5e7fb0ae5d99cf9d4255472fcfed13a14d3b2734b602f95e84796a761c5231a418a137d3fbdc500
-
Filesize
8KB
MD5324c2e555431e860fac2b2bfc04adb1d
SHA1c1f4215f0452f1d96c92ee324bc2cef999294874
SHA256cb2079641bb1bac84ed28836bb03817e09017553e412e26d166673459ad4c688
SHA51207fac78b65341498eaea79e46bdeed74d516db58d66c03b6a5e7fb0ae5d99cf9d4255472fcfed13a14d3b2734b602f95e84796a761c5231a418a137d3fbdc500
-
Filesize
41KB
MD5458168047894c09ae76b0add79c7122d
SHA14e291744275e8e9006c15d03489e0b252592a817
SHA25699c506c6a6fbbf9d7ed9e20ed02dfb91be159f0f33498153ca2894731fe41949
SHA512fcdad8b12068cd6f1da8a6ab1cab610aa383a1f86aaf4523122e3ce0fd9ab7315fc6c239259860ab13dd83342c75c7aa18c997bc7eaefa445a77bdb7eb14ff61
-
Filesize
41KB
MD5458168047894c09ae76b0add79c7122d
SHA14e291744275e8e9006c15d03489e0b252592a817
SHA25699c506c6a6fbbf9d7ed9e20ed02dfb91be159f0f33498153ca2894731fe41949
SHA512fcdad8b12068cd6f1da8a6ab1cab610aa383a1f86aaf4523122e3ce0fd9ab7315fc6c239259860ab13dd83342c75c7aa18c997bc7eaefa445a77bdb7eb14ff61