Analysis

  • max time kernel
    56s
  • max time network
    58s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240412-en
  • resource tags

    arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    21-04-2024 16:17

Errors

Reason
Machine shutdown: "{\"level\":\"info\",\"time\":\"2024-04-21T16:18:11Z\",\"message\":\"Dirty snapshot: /var/lib/sandbox/hatchvm/win11-20240412-en/instance_12-dirty.qcow2\"}"

General

  • Target

    https://github.com/davon21121/krampus-cracked

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discordapp.com/api/webhooks/1227755328331055104/yv0O4qpiLKYiPVsNq52ssWn10u8_DYKLpIwqabGIAH6LWtMNT1NnTVGkUAqT7knivE64

Signatures

  • Mercurial Grabber Stealer

    Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

  • Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
  • Looks for VMWare Tools registry key 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Checks SCSI registry key(s) 3 TTPs 1 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 7 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 1 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 33 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/davon21121/krampus-cracked
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3976
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffe70323cb8,0x7ffe70323cc8,0x7ffe70323cd8
      2⤵
        PID:928
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1900,13621796159799554759,10883889575522562586,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1896 /prefetch:2
        2⤵
          PID:2280
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1900,13621796159799554759,10883889575522562586,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2376 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1400
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1900,13621796159799554759,10883889575522562586,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:8
          2⤵
            PID:1320
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,13621796159799554759,10883889575522562586,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:1
            2⤵
              PID:4852
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,13621796159799554759,10883889575522562586,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:1
              2⤵
                PID:3160
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1900,13621796159799554759,10883889575522562586,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4608 /prefetch:8
                2⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:3128
              • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1900,13621796159799554759,10883889575522562586,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5684 /prefetch:8
                2⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:3600
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,13621796159799554759,10883889575522562586,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:1
                2⤵
                  PID:3144
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1900,13621796159799554759,10883889575522562586,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 /prefetch:8
                  2⤵
                  • NTFS ADS
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4628
              • C:\Windows\System32\CompPkgSrv.exe
                C:\Windows\System32\CompPkgSrv.exe -Embedding
                1⤵
                  PID:4868
                • C:\Windows\System32\CompPkgSrv.exe
                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                  1⤵
                    PID:4940
                  • C:\Windows\System32\rundll32.exe
                    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                    1⤵
                      PID:1488
                    • C:\Users\Admin\Desktop\krampus-cracked-main\celex.exe
                      "C:\Users\Admin\Desktop\krampus-cracked-main\celex.exe"
                      1⤵
                      • Looks for VirtualBox Guest Additions in registry
                      • Looks for VMWare Tools registry key
                      • Checks BIOS information in registry
                      • Maps connected drives based on registry
                      • Checks SCSI registry key(s)
                      • Checks processor information in registry
                      • Enumerates system info in registry
                      • Suspicious use of AdjustPrivilegeToken
                      PID:908
                    • C:\Windows\system32\LogonUI.exe
                      "LogonUI.exe" /flags:0x4 /state0:0xa3a3b055 /state1:0x41c64e6d
                      1⤵
                      • Modifies data under HKEY_USERS
                      • Suspicious use of SetWindowsHookEx
                      PID:1056

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                      Filesize

                      152B

                      MD5

                      6e15af8f29dec1e606c7774ef749eaf2

                      SHA1

                      15fbec608e4aa6ddd0e7fd8ea64c2e8197345e97

                      SHA256

                      de9124e3fddde204df6a6df22b8b87a51823ba227d3e304a6a6aced9da00c74c

                      SHA512

                      1c9c9acd158273749e666271a5cdb2a6aebf6e2b43b835ebcc49d5b48490cbbf4deddef08c232417cee33d4809dec9ddac2478765c1f3d7ed8ea7441f5fd1d15

                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                      Filesize

                      152B

                      MD5

                      3e5a2dac1f49835cf442fde4b7f74b88

                      SHA1

                      7b2cf4e2820f304adf533d43e6d75b3008941f72

                      SHA256

                      30bd1e1bafb4502c91c1fb568372c0fb046d32a4b732e6b88ce59ea23663e4ce

                      SHA512

                      933ac835894ce6cb8aac0261153823c96b6abec955173653dd56e534d644efd03aec71acb4f8cb0b9af871962296ec06cd03e570a0ac53098b8cd55657543786

                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                      Filesize

                      2KB

                      MD5

                      518a3c4c68c8d72d0fc1507c0f9235ef

                      SHA1

                      0dde5003958843753e7f8aa8b2f143e9a389a8f9

                      SHA256

                      27cda41e52eaee2352757191400b47c3d9c4d7e08cec297c1cbee2eed581f4ae

                      SHA512

                      19d271c4aebb44bb3a7e8ea8ddc08493af30ebae994bb73fa761c0fa9a8ac711d506226a36382bdc743289228d40dae8c548669502a3844597ecc58818f549c9

                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                      Filesize

                      111B

                      MD5

                      807419ca9a4734feaf8d8563a003b048

                      SHA1

                      a723c7d60a65886ffa068711f1e900ccc85922a6

                      SHA256

                      aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631

                      SHA512

                      f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c

                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                      Filesize

                      5KB

                      MD5

                      b0100c5c5aa9f1de3742395c6e4bbaf4

                      SHA1

                      c7a4a2c27ebaa556bd19a451843324a58182c1e1

                      SHA256

                      5fcf895bd7811a629462aaa658c9d35672d4479b3102ec26b03a3a3f63f401d4

                      SHA512

                      6bec6b03d15090fc3dbc549d8ff00d005aa6ed69788604399f4189228d96173b2d9127d5882f797646a70babc4a6cd48df13880655d2d526b6712ad1ffacd205

                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                      Filesize

                      6KB

                      MD5

                      bc2a45f803bb8967077b5bf72a826d75

                      SHA1

                      07599fc55522280788a9f6a480f4ced3c8307422

                      SHA256

                      98587270bac4f2f0225a9ea74e11c6258ac15a19705de650138594abf5e00477

                      SHA512

                      8ab044315484c52dbdab162442c6cf992ce307abb7f2d7c01612714121db6bd138edd27bffdb935ef9ede53903ca2b904b8e58a55e1ef862aaa51e1842f9ff56

                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                      Filesize

                      6KB

                      MD5

                      0652109c1491e825534177e9e4cfd8e4

                      SHA1

                      b9f50ae6396e35b8181cdde1ce48939b385efd11

                      SHA256

                      6c0c0f2fcd061b1461bbc1d7cfcabea93a859f40d176696d325b081fd5017e91

                      SHA512

                      0db439660efc2371f31c9470950771a48c1593a74d22e650c2e740a9a49e6d6c36099ca3088f305997574886ad8266d0b35a0caf97f3dac4da2a75d6173c18b0

                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                      Filesize

                      1KB

                      MD5

                      ea6483730610185c930f6b138a579ff5

                      SHA1

                      78ed2803572f646b01bd616d0ac7d6b26e99aedf

                      SHA256

                      f7712550cfcbf542daa0e228f1e575b4786a8c760d7028437ebb9167c45b45a6

                      SHA512

                      9868d715a640c690b22dc08519d43acb9c076564cb5b2835c3158cac4f1b14f5d6e8e309a74fb2ba9ae308f2c5a883c7fb011d230f28c22748b354b0171d72e7

                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                      Filesize

                      1KB

                      MD5

                      99285a464db232981b6ef4530d794457

                      SHA1

                      70e976ec851a1ddfe727ba369b0f88857704d0b9

                      SHA256

                      4d0d298f1cc984ab06fed06b6382d97cb028e4e3988a5e82c3fe32569897b4a4

                      SHA512

                      edcc0182299004235f01708931483542a712686a7cc2bc1407a7cf19124863bb201868f390c5c9d85f6d8ca20e55b535085aaf5b4e90931aa2758dc2d2b49380

                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe579e92.TMP

                      Filesize

                      874B

                      MD5

                      f0f6fd5ef755f5cb7d67b7df2c15fdda

                      SHA1

                      9201c7956898ab437c1247ddc8ba3b69e72621a8

                      SHA256

                      d424804aee743dba348f18b0709b97dd3b26a22beb989251f6b71d2e65fb9097

                      SHA512

                      176710d6384a1e8fa62ee1d0f5438adc5438c2ae5491f409445234e5aa212e29d09bc9756803f168af91d3bae26e0b0c778a20fc7e95823c1a4e3a5be47debd5

                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                      Filesize

                      16B

                      MD5

                      46295cac801e5d4857d09837238a6394

                      SHA1

                      44e0fa1b517dbf802b18faf0785eeea6ac51594b

                      SHA256

                      0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                      SHA512

                      8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                      Filesize

                      16B

                      MD5

                      206702161f94c5cd39fadd03f4014d98

                      SHA1

                      bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                      SHA256

                      1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                      SHA512

                      0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                      Filesize

                      11KB

                      MD5

                      90c1a954be4f785002f028ebeaddbfad

                      SHA1

                      85e6861c8bf82d68eed152abc36ec8b969633a5b

                      SHA256

                      6d55b13fbaf3adc9fe0dcb2906b72e5da665ab80b15ceda86fc96c9bc85f907c

                      SHA512

                      c1ae121e03171a9263926fad39353855522a7d579bad6b25289da431aff9f7e9e99c094d016ef118176e780655f86de80cbae338c38a0eceef26020241d45dce

                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                      Filesize

                      11KB

                      MD5

                      082b4a8d1aab983de48f73c6b31e32d0

                      SHA1

                      211f2992bb1207ac417babc7d76088efda19a6a0

                      SHA256

                      03f5775670ea00356c20ecddd9fade3b2882e57c684e94d0620b815450ccd756

                      SHA512

                      1afe455b5b12695ee7b51bca0b2ba51e75836434f3a539b31c447df93389e2dc44a8e67bcb7b0f7bc6db627296805c5249f53c6c0fc04be1cb59c539697abf4d

                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                      Filesize

                      11KB

                      MD5

                      50abdc0d3e665ffe81f1d6db67c73e13

                      SHA1

                      6a49b955820fa622aade3853032a9545a5502bd6

                      SHA256

                      110ea5e39dda9424312b8f535aab050cb720b8989f154fafc283aa4944abaa37

                      SHA512

                      f7eac86fb98a2ea25343a50e63768f728a0c7c5b62e99e85f415c8123860c858b95a95e83f7a62ed43f11c8b95b2644ae84aa0d9a73399884df0828e668f4b5f

                    • C:\Users\Admin\Downloads\krampus-cracked-main.zip

                      Filesize

                      21KB

                      MD5

                      ab1d6d49f8c08137fceeba3d84b13e5d

                      SHA1

                      efeecd825a0ab8440723e81da0868e8e574d3946

                      SHA256

                      b91c035e82e8873d014a4d3f1add9ac5cdee9f8febfdbd20a1e3688b02f36358

                      SHA512

                      32cc82ded6dd31e1706d006d63c4080d8e1902ea216aec72d1fca67183254f2b7a7edf735b0490c8144c12e7105611583a4dbbb18108727c4a0c60c78e107038

                    • C:\Users\Admin\Downloads\krampus-cracked-main.zip:Zone.Identifier

                      Filesize

                      169B

                      MD5

                      b44f675e35690a2f185977195795d810

                      SHA1

                      058b024c6b8be9edc00da0bdf2c29481e97b222c

                      SHA256

                      3a66410837b118e923344bf6bfa04794b37f7f6c0c4ab84b040feb98a99b353c

                      SHA512

                      bcbd490c609a3af0df39f5620e4ec4e8e696e182aac91127639e9e373b0df48fc2c7fee792d6713bfc5bfb96e4deddb3bada2fd404e057bbc7bda982192505a6

                    • memory/908-291-0x0000000000770000-0x0000000000784000-memory.dmp

                      Filesize

                      80KB

                    • memory/908-292-0x00007FFE5B430000-0x00007FFE5BEF2000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/908-293-0x000000001B490000-0x000000001B4A0000-memory.dmp

                      Filesize

                      64KB

                    • memory/908-297-0x00007FFE5B430000-0x00007FFE5BEF2000-memory.dmp

                      Filesize

                      10.8MB