Analysis

  • max time kernel
    300s
  • max time network
    286s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    16-03-2024 20:12

General

  • Target

    https://github.com/Ahmad00102/Skript.gg

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/1014925257104162816/i_FgV0Vzo9Zj1gKs2wPCtFL9nQzLwfkh1frAZ_EO2HgDoESbbCIxJZtcdGID1SDoDkRZ

Signatures

  • Mercurial Grabber Stealer

    Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 41 IoCs
  • Suspicious use of SendNotifyMessage 16 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/Ahmad00102/Skript.gg
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1916
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff9d0919758,0x7ff9d0919768,0x7ff9d0919778
      2⤵
        PID:344
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1548 --field-trial-handle=1812,i,12952974208814107239,21589253350556354,131072 /prefetch:2
        2⤵
          PID:1220
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 --field-trial-handle=1812,i,12952974208814107239,21589253350556354,131072 /prefetch:8
          2⤵
            PID:4520
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2180 --field-trial-handle=1812,i,12952974208814107239,21589253350556354,131072 /prefetch:8
            2⤵
              PID:824
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2956 --field-trial-handle=1812,i,12952974208814107239,21589253350556354,131072 /prefetch:1
              2⤵
                PID:2424
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2976 --field-trial-handle=1812,i,12952974208814107239,21589253350556354,131072 /prefetch:1
                2⤵
                  PID:3468
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 --field-trial-handle=1812,i,12952974208814107239,21589253350556354,131072 /prefetch:8
                  2⤵
                    PID:2124
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4832 --field-trial-handle=1812,i,12952974208814107239,21589253350556354,131072 /prefetch:8
                    2⤵
                      PID:1152
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5344 --field-trial-handle=1812,i,12952974208814107239,21589253350556354,131072 /prefetch:8
                      2⤵
                      • NTFS ADS
                      PID:4840
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=956 --field-trial-handle=1812,i,12952974208814107239,21589253350556354,131072 /prefetch:2
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:3092
                  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                    "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                    1⤵
                      PID:2440
                    • C:\Windows\System32\rundll32.exe
                      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                      1⤵
                        PID:4748
                      • C:\Users\Admin\Downloads\Skript.gg-main\Skript.gg-main\S0.KvRIxPT.exe
                        "C:\Users\Admin\Downloads\Skript.gg-main\Skript.gg-main\S0.KvRIxPT.exe"
                        1⤵
                        • Checks processor information in registry
                        PID:3612

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                        Filesize

                        1KB

                        MD5

                        3493b01c00912e000be5511b5b73ee67

                        SHA1

                        87e3df05145ced503b9c4121ed470c06e68462d6

                        SHA256

                        47bd136687c45bfe95004a7adb172d1c38400a5a7a68bdc51df0c307c9f317ba

                        SHA512

                        a039c7208d6c95151350e70894de6e345234cb8ee44d6034e189f30a1cbf56c85fabc43f778e0266b80c9b4121f8d1fcf04565017f644bb3ba93ea418cc55a04

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                        Filesize

                        1KB

                        MD5

                        1046869824b7820b22f15f34325b04ee

                        SHA1

                        8aa558dbd388760085dc67255a4fa2dd57e5b198

                        SHA256

                        06affdc1a6bb328ec1619f38e4fe8f042bb8ae85948147ff908aa4896857ac1d

                        SHA512

                        b1661be0a605657e33851b7186e033176b67f5c36ae19d727fa99a2fe9f9c0c96da88ab40b42ab9e1c21cafb0733b3058ad6b44dcbffa8d14537ec9937a61e26

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                        Filesize

                        1KB

                        MD5

                        32827fdbf942f98f8e023e8cb1739629

                        SHA1

                        3c8268ff0319a2a99cfac379c83783deae5d0224

                        SHA256

                        c1b211b59ee78368acb03f0c8285c791a03736c1a02b5a4f6231533971cea8b8

                        SHA512

                        4d4979b4528a249bb77e228e3ca941a1ad3f1d6f2bd14b8f56a7f6e7ee559c91cbef7447abcfcff4b4e9cb5f7c3e4819ab1babcce2f72e62333dce2d1db8274d

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                        Filesize

                        1KB

                        MD5

                        b526063e813b6a2ab9c58b9757b75012

                        SHA1

                        097118abf21630085657a56b861565aa38fd93cf

                        SHA256

                        bea75207664dc70f695b6ca9b76d71171cd3fa3f0eb83cea73561cb81e41c664

                        SHA512

                        8ae610bfc861885a26ad94ece3a9ae30bfe72c6f00ce189f8f5b9e91cd49600b9666a8beec623c0d0ce04123c1e14d4c718110680ca71eb643a55f168c286c9d

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                        Filesize

                        1KB

                        MD5

                        85a8e93256d6dd26f5aa770a2c6c23f1

                        SHA1

                        f0b5838ba8d99d6ac4f5c63a4be3efdd58886ab9

                        SHA256

                        544815686353053ba1e4b5239eb89786c252ecc05f43cdbd4ec670385a547d4e

                        SHA512

                        c78f5b02c0d5a9b2ae79ba73691aa5b80af66a83fc7f481fe78269051b1449563c2debdf63bc0f76a755f2a9ab71e3f4cfd49ed2909bc5260f13f538ef8502fe

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        6KB

                        MD5

                        6bb4aeda90e5d8c76a2f270c165d4cd7

                        SHA1

                        a7ef4b8bcca7d9da48a7c34f13d0412d0f2f0b0a

                        SHA256

                        503545939f2bb3a152fdf008466be6e69cfe47aecc554553dc581c254dd31992

                        SHA512

                        d69923f534d9c96eda23d09f0a884ac82658ae6ff2c60d6195eaa2ccdb6e1b5711c1fa71323c23f8cfac490f27a92a93e36e95e49c18ecb90b3ff6bcab20b57a

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                        Filesize

                        6KB

                        MD5

                        9bebcbd1db21d23f8554f7ba52f37ff8

                        SHA1

                        0b35b55d30c7dea246fff97d8497f5a3f87641b1

                        SHA256

                        0efad0d6e792e030ea71c84b1f6e6b944cb9f65fcf23bc3e3099c0ef896d1645

                        SHA512

                        4c1ad65a4f590d35c81b36968f5677fd5ae926d6bea4fc059d8775b1a4cb467a5a457c40318c4425309c1c1fa130211a3f80a89d69ca51fb3aebc5619f5b7f70

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                        Filesize

                        130KB

                        MD5

                        67d91d1b8a4b828d3727749a332bd9be

                        SHA1

                        fa1d2235df53c743e72d8aa3fcb6e43139c5ce34

                        SHA256

                        78f252b471cd433b5fb5ad69fda22cccacee83ecf9bcaaf171b7d91a31749f44

                        SHA512

                        28dd949d0578b7110110c2712a0c7df65a8b10a558a7e154677ab7fbce8c6bc5716b196f15b88f47a491c3280ecb32c41663972e051c306090244bfb25986424

                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                        Filesize

                        2B

                        MD5

                        99914b932bd37a50b983c5e7c90ae93b

                        SHA1

                        bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                        SHA256

                        44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                        SHA512

                        27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                      • C:\Users\Admin\Downloads\Skript.gg-main.zip:Zone.Identifier

                        Filesize

                        157B

                        MD5

                        3f9318b97431579e96396c2ba0e9804d

                        SHA1

                        4ad7284aa92c4f7be650801d1f8ae3e5e59139e5

                        SHA256

                        4ef83485b0c1321372d25da30f075673b082a273f01033dba62bd8b393d286d0

                        SHA512

                        18e841d045d625a55be398644e03d05179c6a01f01549364adf8ef32d09edc54d762fc19778b6554f3d3dd242e5e3818752c374d27f656710b0bfdce1568f6b9

                      • memory/3612-213-0x0000000000EF0000-0x0000000000F00000-memory.dmp

                        Filesize

                        64KB

                      • memory/3612-214-0x00007FF9BBE60000-0x00007FF9BC922000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/3612-232-0x00007FF9BBE60000-0x00007FF9BC922000-memory.dmp

                        Filesize

                        10.8MB