Analysis

  • max time kernel
    35s
  • max time network
    36s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240412-en
  • resource tags

    arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    21-04-2024 22:02

General

  • Target

    https://github.com/davon21121/krampus-cracked

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discordapp.com/api/webhooks/1227755328331055104/yv0O4qpiLKYiPVsNq52ssWn10u8_DYKLpIwqabGIAH6LWtMNT1NnTVGkUAqT7knivE64

Signatures

  • Mercurial Grabber Stealer

    Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

  • Looks for VirtualBox Guest Additions in registry 2 TTPs 2 IoCs
  • Downloads MZ/PE file
  • Looks for VMWare Tools registry key 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Maps connected drives based on registry 3 TTPs 4 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Checks SCSI registry key(s) 3 TTPs 2 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 11 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/davon21121/krampus-cracked
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3936
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffdc0c9ab58,0x7ffdc0c9ab68,0x7ffdc0c9ab78
      2⤵
        PID:3328
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1616 --field-trial-handle=1824,i,6358754664634796245,16868004687085142405,131072 /prefetch:2
        2⤵
          PID:4352
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2096 --field-trial-handle=1824,i,6358754664634796245,16868004687085142405,131072 /prefetch:8
          2⤵
            PID:5040
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2124 --field-trial-handle=1824,i,6358754664634796245,16868004687085142405,131072 /prefetch:8
            2⤵
              PID:3644
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3012 --field-trial-handle=1824,i,6358754664634796245,16868004687085142405,131072 /prefetch:1
              2⤵
                PID:1084
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3020 --field-trial-handle=1824,i,6358754664634796245,16868004687085142405,131072 /prefetch:1
                2⤵
                  PID:3708
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4260 --field-trial-handle=1824,i,6358754664634796245,16868004687085142405,131072 /prefetch:8
                  2⤵
                    PID:3560
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4488 --field-trial-handle=1824,i,6358754664634796245,16868004687085142405,131072 /prefetch:8
                    2⤵
                      PID:904
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4692 --field-trial-handle=1824,i,6358754664634796245,16868004687085142405,131072 /prefetch:8
                      2⤵
                        PID:2864
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4872 --field-trial-handle=1824,i,6358754664634796245,16868004687085142405,131072 /prefetch:8
                        2⤵
                          PID:5076
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4680 --field-trial-handle=1824,i,6358754664634796245,16868004687085142405,131072 /prefetch:8
                          2⤵
                          • NTFS ADS
                          PID:4656
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4524 --field-trial-handle=1824,i,6358754664634796245,16868004687085142405,131072 /prefetch:8
                          2⤵
                            PID:1280
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4908 --field-trial-handle=1824,i,6358754664634796245,16868004687085142405,131072 /prefetch:8
                            2⤵
                              PID:2016
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4676 --field-trial-handle=1824,i,6358754664634796245,16868004687085142405,131072 /prefetch:8
                              2⤵
                                PID:2220
                            • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                              "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                              1⤵
                                PID:600
                              • C:\Windows\System32\rundll32.exe
                                C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                1⤵
                                  PID:2700
                                • C:\Users\Admin\Downloads\celex.exe
                                  "C:\Users\Admin\Downloads\celex.exe"
                                  1⤵
                                  • Looks for VirtualBox Guest Additions in registry
                                  • Looks for VMWare Tools registry key
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Maps connected drives based on registry
                                  • Checks SCSI registry key(s)
                                  • Checks processor information in registry
                                  • Enumerates system info in registry
                                  • Modifies system certificate store
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3404
                                • C:\Users\Admin\Downloads\celex.exe
                                  "C:\Users\Admin\Downloads\celex.exe"
                                  1⤵
                                  • Looks for VirtualBox Guest Additions in registry
                                  • Looks for VMWare Tools registry key
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Maps connected drives based on registry
                                  • Checks SCSI registry key(s)
                                  • Checks processor information in registry
                                  • Enumerates system info in registry
                                  • Modifies system certificate store
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1156

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                  Filesize

                                  2KB

                                  MD5

                                  b7f6dc1c06594da4f856baa0873ff34b

                                  SHA1

                                  854e12da64c4e9af70c1f6890caee83f96daf210

                                  SHA256

                                  ccfc2bb0747cc4d16ceb7313935b9f5fccff347ae889c42db05431f0aab2ea47

                                  SHA512

                                  892c46c674f2042b04220847e8f26dbc49c51b998877f01843a1f6d765920d9e6fd00324f7e9af64a2661e9a0b8890c22ffe0a99304c6b86450d650c2bee7d09

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                  Filesize

                                  2B

                                  MD5

                                  d751713988987e9331980363e24189ce

                                  SHA1

                                  97d170e1550eee4afc0af065b78cda302a97674c

                                  SHA256

                                  4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                  SHA512

                                  b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                  Filesize

                                  1KB

                                  MD5

                                  3042942d536acd61ea3313132b9150ee

                                  SHA1

                                  9bc250e4bec8227c36375058eec298bbb9eef23a

                                  SHA256

                                  cc4634af4b05c5937df9b2d685f4ca85f506f711558294cce9c23d3720bac5ae

                                  SHA512

                                  fa9c932bb06c0861a176a9ca5298925021817376817f5dbf0bf0fec6f6b0162c9eaa6d7aa57e1d09640544869803e95e40932ee0162f3878114cf10527f19751

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  7KB

                                  MD5

                                  e0d57fd9363fafd9ef1adcad8570741e

                                  SHA1

                                  fb602db6d9ddc136f3abe14052c6cd83dc084981

                                  SHA256

                                  4627d5cd88020f0614e15cce673059fa943f6d31604ad39c072c0906a9beef91

                                  SHA512

                                  fada43e036e8a5fbfa9af482c77021e65fe4007ff29220bb373748570ee520e38b50c3f2b25ed5f3d23c0d87ee27633c003b499c15c71042d3c5fd661cab1913

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  7KB

                                  MD5

                                  7aa1792da96e31d671e22a5c276a29b5

                                  SHA1

                                  4b23e641f2c5a0db3284c2b4b300d897c6e69c85

                                  SHA256

                                  08a4bf1fd732f619d314d63d23955f0e44d74a3a3c86b3e1701453ae8bccafb4

                                  SHA512

                                  59b5e9cc2947a5e61677fb79efb01a7451602e9ebd1e4c3b258c9dd970d89b0df666d55faf44654fe79878105c407b6847b9175e72cf1b08e20322ad63a8b99d

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                  Filesize

                                  127KB

                                  MD5

                                  4cd4d6987331d8db952e8e602425b16e

                                  SHA1

                                  7c223a35eb069058834b97f2817922ebdc0bd1a7

                                  SHA256

                                  1b4c38656aae5a87fb13a7edc29bd46fadae89cac670074facacb787a22c98e2

                                  SHA512

                                  88de7c1e863bf140efde8a2b24090cf614e14d6ab6b9c810b49e7a5b1120407f38030c8417b0c072af692132d0eb72c1b8c36b016ce769940b8b2e82ea4c509a

                                • C:\Users\Admin\Downloads\celex.exe

                                  Filesize

                                  57KB

                                  MD5

                                  69a50f0c4f89045e1eb9e40f9572eed3

                                  SHA1

                                  6f85531565de2110fffd32c41e2a4dfb302fb2cb

                                  SHA256

                                  627ad8116d070bd8a7f9ccd5b392404d330eb07dcc44a137a550b5addb43f3b1

                                  SHA512

                                  877a3f8a885c743de34b840d9c7e72a083db5d3a9f013898a1e889944d3fa2489ab98814d5582c6202d1a631ef3e6152fdf3ff15c94046366ffc3a9c928e70e3

                                • C:\Users\Admin\Downloads\celex.exe:Zone.Identifier

                                  Filesize

                                  55B

                                  MD5

                                  0f98a5550abe0fb880568b1480c96a1c

                                  SHA1

                                  d2ce9f7057b201d31f79f3aee2225d89f36be07d

                                  SHA256

                                  2dfb5f4b33e4cf8237b732c02b1f2b1192ffe4b83114bcf821f489bbf48c6aa1

                                  SHA512

                                  dbc1150d831950684ab37407defac0177b7583da0fe13ee8f8eeb65e8b05d23b357722246888189b4681b97507a4262ece96a1c458c4427a9a41d8ea8d11a2f6

                                • memory/1156-246-0x00007FFDAC2D0000-0x00007FFDACD92000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/1156-250-0x00007FFDAC2D0000-0x00007FFDACD92000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/3404-227-0x0000000000100000-0x0000000000114000-memory.dmp

                                  Filesize

                                  80KB

                                • memory/3404-228-0x00007FFDAC2D0000-0x00007FFDACD92000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/3404-229-0x000000001AE00000-0x000000001AE10000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3404-242-0x00007FFDAC2D0000-0x00007FFDACD92000-memory.dmp

                                  Filesize

                                  10.8MB