Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 05:09
Static task
static1
Behavioral task
behavioral1
Sample
56d5e98fa935cef43afc85e3147032ed.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
56d5e98fa935cef43afc85e3147032ed.exe
Resource
win10v2004-20231222-en
General
-
Target
56d5e98fa935cef43afc85e3147032ed.exe
-
Size
564KB
-
MD5
56d5e98fa935cef43afc85e3147032ed
-
SHA1
f3cfe8dccef85c401cc272106af0e87c7d0f0b9b
-
SHA256
7b3038bd41ac34e36fc87a857a66a357b3c48989c7d26a522ea16e9b205f2ce1
-
SHA512
d7ce889e6e26e0c448dd4389e01fb42a9fc07a6b835eed098613b114e319db26c097f72b0dcc82346a7f7f17c524d690c13e6abeb372968b16daf72ecd584cdf
-
SSDEEP
12288:7oSWNT8ep3NLC1AZI4C4I9ep4GnaK0jKfFqosmN0YBDIu48+v4:7oS2T8e5NLCSZc4IBUaK0j6N0YBDIucQ
Malware Config
Extracted
mercurialgrabber
https://discord.com/api/webhooks/870291367530737705/kitCWvdskV4mesZN15sftPzdN9h7p-Y0ANa240mBlgWkIh9632aLpUK7C0zdv_guqyVv
Signatures
-
Mercurial Grabber Stealer
Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions hook_old.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\VMWare, Inc.\VMWare Tools hook_old.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion hook_old.exe -
Executes dropped EXE 4 IoCs
pid Process 2992 extd.exe 1576 hook.exe 1600 hook_old.exe 2616 extd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x00060000000231e9-10.dat upx behavioral2/memory/2992-11-0x0000000000400000-0x00000000004A5000-memory.dmp upx behavioral2/memory/2992-13-0x0000000000400000-0x00000000004A5000-memory.dmp upx behavioral2/memory/2616-21-0x0000000000400000-0x00000000004A5000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 9 ip4.seeip.org 53 ip-api.com -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum hook_old.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 hook_old.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4376 1576 WerFault.exe 97 -
Checks SCSI registry key(s) 3 TTPs 1 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_VMware_&Prod_VMware_Virtual_S hook_old.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosInformation hook_old.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemManufacturer hook_old.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemProductName hook_old.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Logical Unit Id 0 hook_old.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1600 hook_old.exe Token: SeDebugPrivilege 1576 hook.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2948 wrote to memory of 856 2948 56d5e98fa935cef43afc85e3147032ed.exe 89 PID 2948 wrote to memory of 856 2948 56d5e98fa935cef43afc85e3147032ed.exe 89 PID 856 wrote to memory of 2992 856 cmd.exe 90 PID 856 wrote to memory of 2992 856 cmd.exe 90 PID 856 wrote to memory of 2992 856 cmd.exe 90 PID 856 wrote to memory of 1576 856 cmd.exe 97 PID 856 wrote to memory of 1576 856 cmd.exe 97 PID 856 wrote to memory of 1576 856 cmd.exe 97 PID 856 wrote to memory of 1600 856 cmd.exe 96 PID 856 wrote to memory of 1600 856 cmd.exe 96 PID 856 wrote to memory of 2616 856 cmd.exe 91 PID 856 wrote to memory of 2616 856 cmd.exe 91 PID 856 wrote to memory of 2616 856 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\56d5e98fa935cef43afc85e3147032ed.exe"C:\Users\Admin\AppData\Local\Temp\56d5e98fa935cef43afc85e3147032ed.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\4621.tmp\4622.tmp\4623.bat C:\Users\Admin\AppData\Local\Temp\56d5e98fa935cef43afc85e3147032ed.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Users\Admin\AppData\Local\Temp\4621.tmp\4622.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\4621.tmp\4622.tmp\extd.exe "/hideself" "" "" "" "" "" "" "" ""3⤵
- Executes dropped EXE
PID:2992
-
-
C:\Users\Admin\AppData\Local\Temp\4621.tmp\4622.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\4621.tmp\4622.tmp\extd.exe "" "" "" "" "" "" "" "" ""3⤵
- Executes dropped EXE
PID:2616
-
-
C:\Users\Admin\AppData\Local\Temp\4621.tmp\hook_old.exehook_old.exe3⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Executes dropped EXE
- Maps connected drives based on registry
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:1600
-
-
C:\Users\Admin\AppData\Local\Temp\4621.tmp\hook.exehook.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1576 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1576 -s 16884⤵
- Program crash
PID:4376
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1576 -ip 15761⤵PID:1040
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
444B
MD5ce706fef80d08acbc949731ad0dc8238
SHA182d542251f607222db9008bdae845020d86310a0
SHA256a4108e208f0ca405e89d9d465ce581a9f463f6e35c47ea4db53e8ff02e1aaf2d
SHA512184b56dc6a6b1163e76a42995a27a6ec1a714f6d061eafc7b747b6b2d53e0e58555b66936de712b6f846da12197c7e51f4bd23054ffeda9247f59f44ef111db1
-
Filesize
259KB
MD5139b5ce627bc9ec1040a91ebe7830f7c
SHA1c7e8154ebed98bea9d1f12b08139d130b6836826
SHA256d4b9b8b1f9ab2fbca7b55c4068bdcefae50ad3994924d67607fc9ae859003332
SHA5128cc0e484ddb2e8bed4b8554e65ab8e3bfbe2a8f1c554a7aec9eac4c9555396e21c4bc2840d499ce4baffed2a4966a7d742c7c3ada58d039630b03472e322042b
-
Filesize
8KB
MD56f6e4c7378b72a39304be541283fe240
SHA1998d9fb26b469f83dfc53d069c2bfdb87084d70f
SHA256d4151d291326af4254a3ce4dad5f4e05b31891bf7bb2a7ca4a0102a768c07a24
SHA5121530420b4401f1e286c7a3568645fc292e0e2776eb00e44080f98c5f6c6fbd91b509b36f2a5ff36da0af8b1ca10cb9d8657e3807e924880c097d5da531ab4362
-
Filesize
139KB
MD5e43d7d4ef044c393418d7a4c7fb6bf08
SHA1d0c6c79a25c460dd57e8ac77006a9bac583b8798
SHA2565893f1da289eff760f03e44b79d224203ab284956e2d4bf8f36250ad0b82ffd7
SHA5120fe8454d3848185278b51ef52b18440a8ebd0df991cc04d8bb4b817e2fdc32d116591b27a888cd043b3ab65b60f1aa6bcea1cf9d9cc3f8e94a85e30bedc5b868
-
Filesize
92KB
MD5d8b6534a3ea852bb10b040685a5b2411
SHA1899e80a18e1d6449faf529f8d111c1aa0800659f
SHA256f247ee93272acdc1f0b2fadfae6d6e64ed0421b712113e10b551e6ce5bd4077d
SHA51267da61a8a4cb13d0138226fb137043f8c2ea56e366025e581ba8cc77e7b97ac2f6da9b95738207aed83adc6760475590ba24c26e0617d327cf7ecbca864a2b1c