Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 11:49
Behavioral task
behavioral1
Sample
178ee7ee223329c599e74ab8fbb4dadf.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
178ee7ee223329c599e74ab8fbb4dadf.exe
Resource
win10v2004-20231215-en
General
-
Target
178ee7ee223329c599e74ab8fbb4dadf.exe
-
Size
44KB
-
MD5
178ee7ee223329c599e74ab8fbb4dadf
-
SHA1
0eade7997946fcd1e8a4e583b3522f6a518d4eef
-
SHA256
e11880a04eb88f49e4f41092c4382336f13177d89b90cb076a34e27b1273eeba
-
SHA512
a7af70fdcf08ee1fc870bded335244cead29047117ac6c581314a0bc9e0459c1b7789149fea6c1815c334b823b5f3bbf5d08deffa28a394a660f24f63e829de6
-
SSDEEP
768:aAMF9oxsedD7EPJuI7nrKbTjCFdGf0WBREhXplgFQg5P:yuD7UWT2UnEzlgFrB
Malware Config
Extracted
mercurialgrabber
https://discord.com/api/webhooks/871668035059073075/gkmIXl2NU_rT1vGbQX1zC-alguEAhJZVJmZKizfBc2ysB15ICEsvWBKk44NCrI_uIByT
Signatures
-
Mercurial Grabber Stealer
Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions 178ee7ee223329c599e74ab8fbb4dadf.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\VMWare, Inc.\VMWare Tools 178ee7ee223329c599e74ab8fbb4dadf.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 178ee7ee223329c599e74ab8fbb4dadf.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 178ee7ee223329c599e74ab8fbb4dadf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 178ee7ee223329c599e74ab8fbb4dadf.exe -
Checks SCSI registry key(s) 3 TTPs 1 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_VMware_&Prod_VMware_Virtual_S 178ee7ee223329c599e74ab8fbb4dadf.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosInformation 178ee7ee223329c599e74ab8fbb4dadf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemManufacturer 178ee7ee223329c599e74ab8fbb4dadf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemProductName 178ee7ee223329c599e74ab8fbb4dadf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Logical Unit Id 0 178ee7ee223329c599e74ab8fbb4dadf.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2140 178ee7ee223329c599e74ab8fbb4dadf.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2140 wrote to memory of 2732 2140 178ee7ee223329c599e74ab8fbb4dadf.exe 29 PID 2140 wrote to memory of 2732 2140 178ee7ee223329c599e74ab8fbb4dadf.exe 29 PID 2140 wrote to memory of 2732 2140 178ee7ee223329c599e74ab8fbb4dadf.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\178ee7ee223329c599e74ab8fbb4dadf.exe"C:\Users\Admin\AppData\Local\Temp\178ee7ee223329c599e74ab8fbb4dadf.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2140 -s 12442⤵PID:2732
-