Analysis

  • max time kernel
    104s
  • max time network
    99s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27/04/2024, 22:58

General

  • Target

    https://github.com/RobloxGrabber/MercurialGrabber

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discordapp.com/api/webhooks/939470554287730708/9MxD7IQU-hw_j8G8O5gGyRKbRqKPLHgLtW0X8ii2F5lAo-msKDl3bcPiX9vORp8iXNb9

Signatures

  • Mercurial Grabber Stealer

    Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

  • Looks for VirtualBox Guest Additions in registry 2 TTPs 3 IoCs
  • Looks for VMWare Tools registry key 2 TTPs 3 IoCs
  • Checks BIOS information in registry 2 TTPs 3 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 15 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 33 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/RobloxGrabber/MercurialGrabber
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2132
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7fffe67c9758,0x7fffe67c9768,0x7fffe67c9778
      2⤵
        PID:2844
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1532 --field-trial-handle=1708,i,17409418133361634569,15208057704115660256,131072 /prefetch:2
        2⤵
          PID:800
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1964 --field-trial-handle=1708,i,17409418133361634569,15208057704115660256,131072 /prefetch:8
          2⤵
            PID:5100
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2064 --field-trial-handle=1708,i,17409418133361634569,15208057704115660256,131072 /prefetch:8
            2⤵
              PID:1044
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2880 --field-trial-handle=1708,i,17409418133361634569,15208057704115660256,131072 /prefetch:1
              2⤵
                PID:4724
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2892 --field-trial-handle=1708,i,17409418133361634569,15208057704115660256,131072 /prefetch:1
                2⤵
                  PID:924
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 --field-trial-handle=1708,i,17409418133361634569,15208057704115660256,131072 /prefetch:8
                  2⤵
                    PID:1012
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4688 --field-trial-handle=1708,i,17409418133361634569,15208057704115660256,131072 /prefetch:8
                    2⤵
                      PID:1020
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 --field-trial-handle=1708,i,17409418133361634569,15208057704115660256,131072 /prefetch:8
                      2⤵
                        PID:5048
                    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                      "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                      1⤵
                        PID:1860
                      • C:\Windows\System32\rundll32.exe
                        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                        1⤵
                          PID:1600
                        • C:\Users\Admin\Downloads\Mercurial.Grabber\MercurialGrabber.exe
                          "C:\Users\Admin\Downloads\Mercurial.Grabber\MercurialGrabber.exe"
                          1⤵
                          • Looks for VirtualBox Guest Additions in registry
                          • Looks for VMWare Tools registry key
                          • Checks BIOS information in registry
                          • Maps connected drives based on registry
                          • Checks SCSI registry key(s)
                          • Enumerates system info in registry
                          PID:748
                        • C:\Users\Admin\Downloads\Mercurial.Grabber\MercurialGrabber.exe
                          "C:\Users\Admin\Downloads\Mercurial.Grabber\MercurialGrabber.exe"
                          1⤵
                          • Looks for VirtualBox Guest Additions in registry
                          • Looks for VMWare Tools registry key
                          • Checks BIOS information in registry
                          • Maps connected drives based on registry
                          • Checks SCSI registry key(s)
                          • Enumerates system info in registry
                          PID:404
                        • C:\Users\Admin\Downloads\Mercurial.Grabber\MercurialGrabber.exe
                          "C:\Users\Admin\Downloads\Mercurial.Grabber\MercurialGrabber.exe"
                          1⤵
                          • Looks for VirtualBox Guest Additions in registry
                          • Looks for VMWare Tools registry key
                          • Checks BIOS information in registry
                          • Maps connected drives based on registry
                          • Checks SCSI registry key(s)
                          • Enumerates system info in registry
                          PID:308
                        • C:\Windows\system32\NOTEPAD.EXE
                          "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\Mercurial.Grabber\readme.txt
                          1⤵
                          • Opens file in notepad (likely ransom note)
                          PID:4276

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                          Filesize

                          2KB

                          MD5

                          b31c8f16ea80ef4f17f2ac3c03179ace

                          SHA1

                          cd39c4751379f038dc3be151b668ff9d39c89d07

                          SHA256

                          3969ca7f9ab30c63032a2f9eef65f657ac136f87f1b476c434c02358c2a73df2

                          SHA512

                          24e07d6e914ee7d6e74983f8e3024f2b8db3242fe8d84850d09f730f2462bf059420ca478e543d7815ef2a10ea81eadd3491f4b04ac13d51cb0d0e7a5ad9ceee

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                          Filesize

                          1018B

                          MD5

                          09a6dfd95dbacc7f1516ac3250ab56ff

                          SHA1

                          d80a9320bf1c5a01ca1e5228ccef11b68d14b5ac

                          SHA256

                          0e5b3b96015f6ae6d1c9fa5af9b228909632b426e9846f0a221c67de44be11ba

                          SHA512

                          57e315bbaa44b7cef7e0e2d514df75eaff5cb7926bb0e425990403b4a52731ffbcf73185b6f181398e65a6071720bd9badeca6d345ca9a25b7c4effc67637057

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                          Filesize

                          1KB

                          MD5

                          5cf63eaee6c76c016abc51e8db5dbe0e

                          SHA1

                          ee4ce53de27e5420ba2a9656ece41b1bbd89f0b6

                          SHA256

                          43ff8481b4d06254ff66f0d95bab769b2a97e42e749a3ae412ff309f3421846f

                          SHA512

                          7672ba85fd0f33edb6669954c7fc8c729a56ac2d8e5cc7d455dc954701e54492e898d4115611fd04da790c841b24146956b215c5da5eb5497e8064977f2da5b4

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                          Filesize

                          702B

                          MD5

                          56987185599573846d6c2a8c892ab11e

                          SHA1

                          f6926deababdaff32ff6fb019e55f479b98c2cd0

                          SHA256

                          852e58a9cc591f3905a469dfcedbcdc38ef643ceb2cbb86fbc7c7d0337d1119e

                          SHA512

                          335a3bac232d22de61b64453a7339e5a9afb576d4b33f6c4014c2ebc6af0bb6f15e507d1788a2425667ba4695518921e3e6525e6bd2624992dea82407b838db7

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                          Filesize

                          1KB

                          MD5

                          2df1d4c7e81fe4090fbcd85d15c2f193

                          SHA1

                          3ed10d473a62c418da3f4e3d49320c370552bf18

                          SHA256

                          82c516e600c73c750b2043f670081e84fb5363cf64a555f6a7e0d4defcffefcc

                          SHA512

                          1a5dc37208e99bdad8d3c5209d7005100131e1498825697d91dfb93910e656f74c4808273a9232a71fb51f656c75204e24509b9df55580b1e2c13af7282b8acb

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                          Filesize

                          1KB

                          MD5

                          14838101dbae8b3b7f5a407773a94d9b

                          SHA1

                          184b3b224834d542381ffe0905a0672bb3fd4a21

                          SHA256

                          6bdec9bbf6098587fed9d719d62aa7341d86526996c9aa104613379b55273e3c

                          SHA512

                          45ed6ce8e58f7740080d3b728c6bfc361fe4fd159f5ba81d363da31f4d6ea889b0840b7d80eb53fd6ecfb918bfa9923c9b697662f9a75852a5b71807042b0471

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          6KB

                          MD5

                          3199e98e35864d552c44cde4d1a1f1a7

                          SHA1

                          670b1329d6747e9095451b876bd6cbe3977269e5

                          SHA256

                          72e9869fc70532e913635d86b0a053b528bc16b3a441f5312e108ef4c25f1161

                          SHA512

                          1cea659490e635685b60552d5099cfa0ef18ff51c4eee4ed262c70241aa3454a3b6cb61102e0f3b3acdd2b25830bbd01ea4e08dbe75baec05a6234a59e2a0e15

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          5KB

                          MD5

                          78350d1fc5613d0585c547cc95e89544

                          SHA1

                          4308ee3890ebf78e5733d17a6e99f9b44cd658cb

                          SHA256

                          884a636d0cba87558e9a2a72b8a0300049d7c3fe47b6bb33758c1d758b4b9556

                          SHA512

                          fe310796b4e4fefa48760d364ba08c15233e32bd592d9a6ff0c47d68891ccd8965f103d28c4058711aaeb2bb986273bcd1452bce7f390f919d12fd6c6f29974c

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          6KB

                          MD5

                          b052749a59879371dc29e2d5c6e19408

                          SHA1

                          9356d7dc9ab92e90ee25ab867633f1ada65eda7a

                          SHA256

                          fe10df19559dcbd913e8a78d754d0ffac09fc4d20c5d0740e018bea90f1e1e19

                          SHA512

                          6dc04fbc1fbd3815a85680e9c68e0791027729820245bf8be0e70dee49a4f02df7cff202d1bfaab55f0d2f1f77d86db1bb39046b47936b57b5722179d04d2f41

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          5KB

                          MD5

                          f94641f942800ef5a58d21fccbb6b968

                          SHA1

                          003f1726d09cb7b6f6a954933af698023d32fa78

                          SHA256

                          b5cab3c02df6132379f6f861a945c8221911e3ee56d1eb6927de091ba567a7da

                          SHA512

                          e18f836878ce63529be31633bec14e0dfbd8565a3446bab2612954b81e042919c7e8c6870d58c8eb886085115bdb5e9384359f2a2ef86d66a6f08aa0d2a955b1

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                          Filesize

                          136KB

                          MD5

                          755dcd0c0b94dde4a8a6c83119e56172

                          SHA1

                          9a3f59a22bd88817a45e11b46b1be448428232b2

                          SHA256

                          a5b07ea7dea28e20c4cb40c260de22e9aa01bbfae8500c940de267e58519aa27

                          SHA512

                          551a40f0c523c1ce8486831c0011b3411545796e927e31bf26bc74922e319f19eea65f32fe2a317549aff0a18ad3aba79b9e21f53672c11a35b128983926816a

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                          Filesize

                          2B

                          MD5

                          99914b932bd37a50b983c5e7c90ae93b

                          SHA1

                          bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                          SHA256

                          44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                          SHA512

                          27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\MercurialGrabber.exe.log

                          Filesize

                          42B

                          MD5

                          84cfdb4b995b1dbf543b26b86c863adc

                          SHA1

                          d2f47764908bf30036cf8248b9ff5541e2711fa2

                          SHA256

                          d8988d672d6915b46946b28c06ad8066c50041f6152a91d37ffa5cf129cc146b

                          SHA512

                          485f0ed45e13f00a93762cbf15b4b8f996553baa021152fae5aba051e3736bcd3ca8f4328f0e6d9e3e1f910c96c4a9ae055331123ee08e3c2ce3a99ac2e177ce

                        • memory/748-248-0x0000000000EE0000-0x0000000000EF0000-memory.dmp

                          Filesize

                          64KB

                        • memory/748-250-0x00007FFFD3DD0000-0x00007FFFD47BC000-memory.dmp

                          Filesize

                          9.9MB

                        • memory/748-254-0x00007FFFD3DD0000-0x00007FFFD47BC000-memory.dmp

                          Filesize

                          9.9MB