Analysis

  • max time kernel
    151s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-03-2024 11:57

General

  • Target

    ddf3fd684f553b4686987ec5cf532c20.exe

  • Size

    8.0MB

  • MD5

    ddf3fd684f553b4686987ec5cf532c20

  • SHA1

    085a5f8b6aa7eafaf8b7cd13e8aaf6756fba1db7

  • SHA256

    a5e43e7a219d301589d65f7dc18997c5b346e34e7d92063f1ed1f10263d34542

  • SHA512

    b5988a061e33f7a742bb42f55dce0145e1defbe7628819a2337349827408480625cb04eacade19ba2495ee366472cc33555ae227b7286b0c58ff909e322f47bc

  • SSDEEP

    196608:OcwTiBknYhfr5QILXP8ZV3PpLsExwsJC4Ct99QTKu6yTL+b0X820iwvefJ:dwWCnYRr5QIXU/3PpLsacVH3TyXz08J

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/853156671664685077/8KUuRAI41xE7p329lIVcKihvvEa-30CxP9F9UkMsip1CErSnArWO8ypnl26upafpelAy

Signatures

  • Mercurial Grabber Stealer

    Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

  • Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
  • Looks for VMWare Tools registry key 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 1 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ddf3fd684f553b4686987ec5cf532c20.exe
    "C:\Users\Admin\AppData\Local\Temp\ddf3fd684f553b4686987ec5cf532c20.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2448
    • C:\Users\Public\Music\test.exe
      "C:\Users\Public\Music\test.exe"
      2⤵
      • Looks for VirtualBox Guest Additions in registry
      • Looks for VMWare Tools registry key
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Maps connected drives based on registry
      • Checks SCSI registry key(s)
      • Enumerates system info in registry
      • Modifies system certificate store
      • Suspicious use of AdjustPrivilegeToken
      PID:4220
    • C:\Users\Public\Music\Lunar_Builder.exe
      "C:\Users\Public\Music\Lunar_Builder.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      PID:3052
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4092 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:2528

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\21130707-67bd-4fd2-91d2-b9f759127e7b\GunaUIDotNetRT.dll

      Filesize

      94KB

      MD5

      14ff402962ad21b78ae0b4c43cd1f194

      SHA1

      f8a510eb26666e875a5bdd1cadad40602763ad72

      SHA256

      fb9646cb956945bdc503e69645f6b5316d3826b780d3c36738d6b944e884d15b

      SHA512

      daa7a08bf3709119a944bce28f6ebdd24e54a22b18cd9f86a87873e958df121a3881dcdd5e162f6b4e543238c7aef20f657c9830df01d4c79290f7c9a4fcc54b

    • C:\Users\Public\Music\Lunar_Builder.exe

      Filesize

      497KB

      MD5

      41c46d064ddba01482191df120ed9d64

      SHA1

      9c51fe0008f98036e7a2194feb33ec04daefe252

      SHA256

      55a5ac3c01eb7e7bcaf65e5786e1fbca2f50a6101f45cf5da3f509d5060a937c

      SHA512

      ab3d5c5e959c5522f551765556c05426869d92c34c28a520d0313334bb8bd26166335f370a90994005e5dbb3e2679cb9537c2f6f05f2bb58949b19bc3f6b4945

    • C:\Users\Public\Music\Lunar_Builder.exe

      Filesize

      1.9MB

      MD5

      e6e7b49452f34060e1288701e0e6b08c

      SHA1

      372cbb15e1fdf04b17f2534864e701db31599503

      SHA256

      4f24ec4ad4bdd2c715ae952d92a0c1ce060253f33346c46cdcd8045fb6a0b34b

      SHA512

      ab9325643df1eb495b599938ef1efcb25f376fcfe604aac90b2fd549eb284f922c4a06e215ff59f209234cd5a0fa421f3fa21ad545b8637f0168e49992ae1a8e

    • C:\Users\Public\Music\Lunar_Builder.exe

      Filesize

      2.4MB

      MD5

      34b8c15a5ad2394702ad076739c8648a

      SHA1

      07aa69829bcbbcc4833d73a055193c41a169bd6f

      SHA256

      c6e4487a543ec3caee37a2f895e886582867810ce0c8a2ce3271d10224f4d550

      SHA512

      755ea0768166f7f006104b15c250c7c88606b2ff0bda046caaaf4ca08ff437561606093b07875028fc4d3547cf5cec44467548f7c3e73ceb4eeec6f2b458fd76

    • C:\Users\Public\Music\test.exe

      Filesize

      41KB

      MD5

      41a0ce6435946c973c6dc624cf8e331a

      SHA1

      587798a56c97b24a7ac09e41e471a5ba022faf0b

      SHA256

      68eaf913650c3c9af5b9feb6f3720bf77166701bd6cf8fc4d44f9c0fae15ca62

      SHA512

      2f44c7151dde13672f7a64ca8dfb030ca7081132385f646d990ca5cdfd4112cd6ebfc621eac93ddcb8df26a368c47d067c3f0b05a13e14f70a0cd2fdf60ea681

    • memory/3052-68-0x000000000B480000-0x000000000B653000-memory.dmp

      Filesize

      1.8MB

    • memory/3052-37-0x0000000003FA0000-0x0000000003FA1000-memory.dmp

      Filesize

      4KB

    • memory/3052-36-0x0000000003FA0000-0x0000000003FA1000-memory.dmp

      Filesize

      4KB

    • memory/3052-74-0x000000000B480000-0x000000000B653000-memory.dmp

      Filesize

      1.8MB

    • memory/3052-1047-0x0000000003FA0000-0x0000000003FA1000-memory.dmp

      Filesize

      4KB

    • memory/3052-38-0x0000000003FA0000-0x0000000003FA1000-memory.dmp

      Filesize

      4KB

    • memory/3052-72-0x000000000B480000-0x000000000B653000-memory.dmp

      Filesize

      1.8MB

    • memory/3052-39-0x000000000AF10000-0x000000000B2F2000-memory.dmp

      Filesize

      3.9MB

    • memory/3052-40-0x000000000B8A0000-0x000000000BE44000-memory.dmp

      Filesize

      5.6MB

    • memory/3052-41-0x00000000741B0000-0x0000000074960000-memory.dmp

      Filesize

      7.7MB

    • memory/3052-42-0x000000000B2F0000-0x000000000B382000-memory.dmp

      Filesize

      584KB

    • memory/3052-43-0x00000000087F0000-0x00000000087FA000-memory.dmp

      Filesize

      40KB

    • memory/3052-44-0x000000000B480000-0x000000000B658000-memory.dmp

      Filesize

      1.8MB

    • memory/3052-28-0x0000000000C60000-0x0000000001C7A000-memory.dmp

      Filesize

      16.1MB

    • memory/3052-52-0x0000000074F10000-0x0000000074F99000-memory.dmp

      Filesize

      548KB

    • memory/3052-53-0x000000000B480000-0x000000000B653000-memory.dmp

      Filesize

      1.8MB

    • memory/3052-54-0x000000000B480000-0x000000000B653000-memory.dmp

      Filesize

      1.8MB

    • memory/3052-56-0x000000000B480000-0x000000000B653000-memory.dmp

      Filesize

      1.8MB

    • memory/3052-70-0x000000000B480000-0x000000000B653000-memory.dmp

      Filesize

      1.8MB

    • memory/3052-60-0x000000000B480000-0x000000000B653000-memory.dmp

      Filesize

      1.8MB

    • memory/3052-62-0x000000000B480000-0x000000000B653000-memory.dmp

      Filesize

      1.8MB

    • memory/3052-64-0x000000000B480000-0x000000000B653000-memory.dmp

      Filesize

      1.8MB

    • memory/3052-66-0x000000000B480000-0x000000000B653000-memory.dmp

      Filesize

      1.8MB

    • memory/3052-27-0x00000000741B0000-0x0000000074960000-memory.dmp

      Filesize

      7.7MB

    • memory/3052-58-0x000000000B480000-0x000000000B653000-memory.dmp

      Filesize

      1.8MB

    • memory/3052-35-0x000000000AC00000-0x000000000AC10000-memory.dmp

      Filesize

      64KB

    • memory/3052-819-0x000000000AC00000-0x000000000AC10000-memory.dmp

      Filesize

      64KB

    • memory/3052-76-0x000000000B480000-0x000000000B653000-memory.dmp

      Filesize

      1.8MB

    • memory/3052-78-0x000000000B480000-0x000000000B653000-memory.dmp

      Filesize

      1.8MB

    • memory/3052-80-0x000000000B480000-0x000000000B653000-memory.dmp

      Filesize

      1.8MB

    • memory/3052-82-0x000000000B480000-0x000000000B653000-memory.dmp

      Filesize

      1.8MB

    • memory/3052-84-0x000000000B480000-0x000000000B653000-memory.dmp

      Filesize

      1.8MB

    • memory/3052-86-0x000000000B480000-0x000000000B653000-memory.dmp

      Filesize

      1.8MB

    • memory/3052-88-0x000000000B480000-0x000000000B653000-memory.dmp

      Filesize

      1.8MB

    • memory/3052-90-0x000000000B480000-0x000000000B653000-memory.dmp

      Filesize

      1.8MB

    • memory/3052-92-0x000000000B480000-0x000000000B653000-memory.dmp

      Filesize

      1.8MB

    • memory/3052-94-0x000000000B480000-0x000000000B653000-memory.dmp

      Filesize

      1.8MB

    • memory/3052-96-0x000000000B480000-0x000000000B653000-memory.dmp

      Filesize

      1.8MB

    • memory/3052-98-0x000000000B480000-0x000000000B653000-memory.dmp

      Filesize

      1.8MB

    • memory/3052-100-0x000000000B480000-0x000000000B653000-memory.dmp

      Filesize

      1.8MB

    • memory/3052-102-0x000000000B480000-0x000000000B653000-memory.dmp

      Filesize

      1.8MB

    • memory/3052-104-0x000000000B480000-0x000000000B653000-memory.dmp

      Filesize

      1.8MB

    • memory/3052-106-0x000000000B480000-0x000000000B653000-memory.dmp

      Filesize

      1.8MB

    • memory/3052-108-0x000000000B480000-0x000000000B653000-memory.dmp

      Filesize

      1.8MB

    • memory/3052-110-0x000000000B480000-0x000000000B653000-memory.dmp

      Filesize

      1.8MB

    • memory/3052-112-0x000000000B480000-0x000000000B653000-memory.dmp

      Filesize

      1.8MB

    • memory/3052-114-0x000000000B480000-0x000000000B653000-memory.dmp

      Filesize

      1.8MB

    • memory/4220-26-0x000000001B040000-0x000000001B050000-memory.dmp

      Filesize

      64KB

    • memory/4220-25-0x00007FFEAA090000-0x00007FFEAAB51000-memory.dmp

      Filesize

      10.8MB

    • memory/4220-24-0x00000000003E0000-0x00000000003F0000-memory.dmp

      Filesize

      64KB

    • memory/4220-34-0x00007FFEAA090000-0x00007FFEAAB51000-memory.dmp

      Filesize

      10.8MB