Malware Analysis Report

2025-06-15 21:44

Sample ID 230409-yv79tach34
Target Mercurial.Grabber.v1.03.rar
SHA256 3759744039346620e9613f40f90e8f318e5f54ad49c070e2bd23b667f7e65bf6
Tags
agilenet
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

3759744039346620e9613f40f90e8f318e5f54ad49c070e2bd23b667f7e65bf6

Threat Level: Shows suspicious behavior

The file Mercurial.Grabber.v1.03.rar was found to be: Shows suspicious behavior.

Malicious Activity Summary

agilenet

Obfuscated with Agile.Net obfuscator

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2023-04-09 20:07

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-04-09 20:07

Reported

2023-04-09 20:10

Platform

win10-20230220-en

Max time kernel

56s

Max time network

71s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Mercurial.exe"

Signatures

Obfuscated with Agile.Net obfuscator

agilenet
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Mercurial.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\Mercurial.exe

"C:\Users\Admin\AppData\Local\Temp\Mercurial.exe"

Network

Country Destination Domain Proto
FR 40.79.141.152:443 tcp
NL 88.221.25.155:80 tcp
US 8.8.8.8:53 86.8.109.52.in-addr.arpa udp

Files

memory/4124-116-0x00000000007A0000-0x0000000000ADA000-memory.dmp

memory/4124-117-0x0000000005940000-0x0000000005E3E000-memory.dmp

memory/4124-118-0x0000000005360000-0x00000000053F2000-memory.dmp

memory/4124-119-0x0000000005300000-0x000000000530A000-memory.dmp

memory/4124-120-0x0000000005310000-0x000000000532C000-memory.dmp

memory/4124-121-0x0000000005400000-0x0000000005420000-memory.dmp

memory/4124-122-0x00000000054B0000-0x00000000054D0000-memory.dmp

memory/4124-123-0x0000000005420000-0x0000000005430000-memory.dmp

memory/4124-124-0x00000000055C0000-0x00000000055D4000-memory.dmp

memory/4124-125-0x00000000055D0000-0x000000000563E000-memory.dmp

memory/4124-127-0x0000000005680000-0x00000000056B6000-memory.dmp

memory/4124-126-0x0000000005650000-0x000000000566E000-memory.dmp

memory/4124-128-0x00000000056D0000-0x00000000056DE000-memory.dmp

memory/4124-129-0x00000000056E0000-0x00000000056EE000-memory.dmp

memory/4124-130-0x0000000005E40000-0x0000000005F8A000-memory.dmp

memory/4124-131-0x0000000005430000-0x0000000005440000-memory.dmp

memory/4124-132-0x0000000005FC0000-0x00000000060D6000-memory.dmp

memory/4124-133-0x00000000060E0000-0x0000000006110000-memory.dmp

memory/4124-134-0x0000000008CA0000-0x0000000008CA8000-memory.dmp

memory/4124-135-0x0000000005430000-0x0000000005440000-memory.dmp

memory/4124-136-0x0000000005430000-0x0000000005440000-memory.dmp

memory/4124-137-0x0000000005430000-0x0000000005440000-memory.dmp

memory/4124-138-0x0000000005430000-0x0000000005440000-memory.dmp

memory/4124-139-0x0000000005430000-0x0000000005440000-memory.dmp

memory/4124-140-0x0000000005430000-0x0000000005440000-memory.dmp

memory/4124-141-0x0000000005430000-0x0000000005440000-memory.dmp

memory/4124-142-0x0000000005430000-0x0000000005440000-memory.dmp

memory/4124-143-0x0000000005430000-0x0000000005440000-memory.dmp

memory/4124-144-0x0000000005430000-0x0000000005440000-memory.dmp

memory/4124-145-0x0000000005430000-0x0000000005440000-memory.dmp

memory/4124-146-0x0000000005430000-0x0000000005440000-memory.dmp

memory/4124-147-0x0000000005430000-0x0000000005440000-memory.dmp