Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-03-2024 20:49
Behavioral task
behavioral1
Sample
tony shold kys lololol.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
tony shold kys lololol.exe
Resource
win10v2004-20240226-en
General
-
Target
tony shold kys lololol.exe
-
Size
42KB
-
MD5
111287326d44a178f58426c8eb19d71f
-
SHA1
79910834d890cccd6e39f93b816bbbb6886a1f58
-
SHA256
7613cc232188581fb63ba9dfffb1c48dcd6d7247da9e77c39ca47fca49e80423
-
SHA512
de7a836de3067d662f0ccee51d0b7be7559cf3e60ab01a9ae643b44d2eb73426550ef5a97a821bf8b31bc42810aa3e95ed63bc41a0e14228ff77307f67a832d2
-
SSDEEP
768:WcNCbujieUYkWgHi+uZ7LgFTjUKZKfgm3EhrI:xitHi7LgFTAF7E5I
Malware Config
Extracted
mercurialgrabber
https://discord.com/api/webhooks/1220473360027488266/q-4L_yhBeHeS3Ra-khWg6n0xBh_vyw7WFIRh7AmBdbD_VmUCsg3bPYLzmbdVuoXzScfA
Signatures
-
Mercurial Grabber Stealer
Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions tony shold kys lololol.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\VMWare, Inc.\VMWare Tools tony shold kys lololol.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion tony shold kys lololol.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 6 discord.com 7 discord.com 8 discord.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip4.seeip.org 4 ip-api.com -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum tony shold kys lololol.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 tony shold kys lololol.exe -
Checks SCSI registry key(s) 3 TTPs 1 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_VMware_&Prod_VMware_Virtual_S tony shold kys lololol.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 tony shold kys lololol.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString tony shold kys lololol.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemProductName tony shold kys lololol.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Logical Unit Id 0 tony shold kys lololol.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosInformation tony shold kys lololol.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemManufacturer tony shold kys lololol.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2156 tony shold kys lololol.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2312 2156 tony shold kys lololol.exe 30 PID 2156 wrote to memory of 2312 2156 tony shold kys lololol.exe 30 PID 2156 wrote to memory of 2312 2156 tony shold kys lololol.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\tony shold kys lololol.exe"C:\Users\Admin\AppData\Local\Temp\tony shold kys lololol.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Checks SCSI registry key(s)
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2156 -s 13042⤵PID:2312
-