Analysis
-
max time kernel
104s -
max time network
99s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
27/04/2024, 22:58
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/RobloxGrabber/MercurialGrabber
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
https://github.com/RobloxGrabber/MercurialGrabber
Resource
win7-20240215-en
Behavioral task
behavioral3
Sample
https://github.com/RobloxGrabber/MercurialGrabber
Resource
win10v2004-20240426-en
General
-
Target
https://github.com/RobloxGrabber/MercurialGrabber
Malware Config
Extracted
mercurialgrabber
https://discordapp.com/api/webhooks/939470554287730708/9MxD7IQU-hw_j8G8O5gGyRKbRqKPLHgLtW0X8ii2F5lAo-msKDl3bcPiX9vORp8iXNb9
Signatures
-
Mercurial Grabber Stealer
Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions MercurialGrabber.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions MercurialGrabber.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions MercurialGrabber.exe -
Looks for VMWare Tools registry key 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\VMWare, Inc.\VMWare Tools MercurialGrabber.exe Key opened \REGISTRY\MACHINE\SOFTWARE\VMWare, Inc.\VMWare Tools MercurialGrabber.exe Key opened \REGISTRY\MACHINE\SOFTWARE\VMWare, Inc.\VMWare Tools MercurialGrabber.exe -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion MercurialGrabber.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion MercurialGrabber.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion MercurialGrabber.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 37 raw.githubusercontent.com 36 raw.githubusercontent.com -
Maps connected drives based on registry 3 TTPs 6 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 MercurialGrabber.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MercurialGrabber.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 MercurialGrabber.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MercurialGrabber.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 MercurialGrabber.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MercurialGrabber.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_VMware_&Prod_VMware_Virtual_S MercurialGrabber.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_VMware_&Prod_VMware_Virtual_S MercurialGrabber.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_VMware_&Prod_VMware_Virtual_S MercurialGrabber.exe -
Enumerates system info in registry 2 TTPs 15 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosInformation MercurialGrabber.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Logical Unit Id 0 MercurialGrabber.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemManufacturer MercurialGrabber.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemProductName MercurialGrabber.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Logical Unit Id 0 MercurialGrabber.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemProductName MercurialGrabber.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemManufacturer MercurialGrabber.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemProductName MercurialGrabber.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosInformation MercurialGrabber.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemManufacturer MercurialGrabber.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosInformation MercurialGrabber.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Logical Unit Id 0 MercurialGrabber.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133587323968755019" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings chrome.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4276 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2132 chrome.exe 2132 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2132 chrome.exe 2132 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe Token: SeShutdownPrivilege 2132 chrome.exe Token: SeCreatePagefilePrivilege 2132 chrome.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2844 2132 chrome.exe 74 PID 2132 wrote to memory of 2844 2132 chrome.exe 74 PID 2132 wrote to memory of 800 2132 chrome.exe 76 PID 2132 wrote to memory of 800 2132 chrome.exe 76 PID 2132 wrote to memory of 800 2132 chrome.exe 76 PID 2132 wrote to memory of 800 2132 chrome.exe 76 PID 2132 wrote to memory of 800 2132 chrome.exe 76 PID 2132 wrote to memory of 800 2132 chrome.exe 76 PID 2132 wrote to memory of 800 2132 chrome.exe 76 PID 2132 wrote to memory of 800 2132 chrome.exe 76 PID 2132 wrote to memory of 800 2132 chrome.exe 76 PID 2132 wrote to memory of 800 2132 chrome.exe 76 PID 2132 wrote to memory of 800 2132 chrome.exe 76 PID 2132 wrote to memory of 800 2132 chrome.exe 76 PID 2132 wrote to memory of 800 2132 chrome.exe 76 PID 2132 wrote to memory of 800 2132 chrome.exe 76 PID 2132 wrote to memory of 800 2132 chrome.exe 76 PID 2132 wrote to memory of 800 2132 chrome.exe 76 PID 2132 wrote to memory of 800 2132 chrome.exe 76 PID 2132 wrote to memory of 800 2132 chrome.exe 76 PID 2132 wrote to memory of 800 2132 chrome.exe 76 PID 2132 wrote to memory of 800 2132 chrome.exe 76 PID 2132 wrote to memory of 800 2132 chrome.exe 76 PID 2132 wrote to memory of 800 2132 chrome.exe 76 PID 2132 wrote to memory of 800 2132 chrome.exe 76 PID 2132 wrote to memory of 800 2132 chrome.exe 76 PID 2132 wrote to memory of 800 2132 chrome.exe 76 PID 2132 wrote to memory of 800 2132 chrome.exe 76 PID 2132 wrote to memory of 800 2132 chrome.exe 76 PID 2132 wrote to memory of 800 2132 chrome.exe 76 PID 2132 wrote to memory of 800 2132 chrome.exe 76 PID 2132 wrote to memory of 800 2132 chrome.exe 76 PID 2132 wrote to memory of 800 2132 chrome.exe 76 PID 2132 wrote to memory of 800 2132 chrome.exe 76 PID 2132 wrote to memory of 800 2132 chrome.exe 76 PID 2132 wrote to memory of 800 2132 chrome.exe 76 PID 2132 wrote to memory of 800 2132 chrome.exe 76 PID 2132 wrote to memory of 800 2132 chrome.exe 76 PID 2132 wrote to memory of 800 2132 chrome.exe 76 PID 2132 wrote to memory of 800 2132 chrome.exe 76 PID 2132 wrote to memory of 5100 2132 chrome.exe 77 PID 2132 wrote to memory of 5100 2132 chrome.exe 77 PID 2132 wrote to memory of 1044 2132 chrome.exe 78 PID 2132 wrote to memory of 1044 2132 chrome.exe 78 PID 2132 wrote to memory of 1044 2132 chrome.exe 78 PID 2132 wrote to memory of 1044 2132 chrome.exe 78 PID 2132 wrote to memory of 1044 2132 chrome.exe 78 PID 2132 wrote to memory of 1044 2132 chrome.exe 78 PID 2132 wrote to memory of 1044 2132 chrome.exe 78 PID 2132 wrote to memory of 1044 2132 chrome.exe 78 PID 2132 wrote to memory of 1044 2132 chrome.exe 78 PID 2132 wrote to memory of 1044 2132 chrome.exe 78 PID 2132 wrote to memory of 1044 2132 chrome.exe 78 PID 2132 wrote to memory of 1044 2132 chrome.exe 78 PID 2132 wrote to memory of 1044 2132 chrome.exe 78 PID 2132 wrote to memory of 1044 2132 chrome.exe 78 PID 2132 wrote to memory of 1044 2132 chrome.exe 78 PID 2132 wrote to memory of 1044 2132 chrome.exe 78 PID 2132 wrote to memory of 1044 2132 chrome.exe 78 PID 2132 wrote to memory of 1044 2132 chrome.exe 78 PID 2132 wrote to memory of 1044 2132 chrome.exe 78 PID 2132 wrote to memory of 1044 2132 chrome.exe 78 PID 2132 wrote to memory of 1044 2132 chrome.exe 78 PID 2132 wrote to memory of 1044 2132 chrome.exe 78
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/RobloxGrabber/MercurialGrabber1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7fffe67c9758,0x7fffe67c9768,0x7fffe67c97782⤵PID:2844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1532 --field-trial-handle=1708,i,17409418133361634569,15208057704115660256,131072 /prefetch:22⤵PID:800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1964 --field-trial-handle=1708,i,17409418133361634569,15208057704115660256,131072 /prefetch:82⤵PID:5100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2064 --field-trial-handle=1708,i,17409418133361634569,15208057704115660256,131072 /prefetch:82⤵PID:1044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2880 --field-trial-handle=1708,i,17409418133361634569,15208057704115660256,131072 /prefetch:12⤵PID:4724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2892 --field-trial-handle=1708,i,17409418133361634569,15208057704115660256,131072 /prefetch:12⤵PID:924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 --field-trial-handle=1708,i,17409418133361634569,15208057704115660256,131072 /prefetch:82⤵PID:1012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4688 --field-trial-handle=1708,i,17409418133361634569,15208057704115660256,131072 /prefetch:82⤵PID:1020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 --field-trial-handle=1708,i,17409418133361634569,15208057704115660256,131072 /prefetch:82⤵PID:5048
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1860
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1600
-
C:\Users\Admin\Downloads\Mercurial.Grabber\MercurialGrabber.exe"C:\Users\Admin\Downloads\Mercurial.Grabber\MercurialGrabber.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Checks SCSI registry key(s)
- Enumerates system info in registry
PID:748
-
C:\Users\Admin\Downloads\Mercurial.Grabber\MercurialGrabber.exe"C:\Users\Admin\Downloads\Mercurial.Grabber\MercurialGrabber.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Checks SCSI registry key(s)
- Enumerates system info in registry
PID:404
-
C:\Users\Admin\Downloads\Mercurial.Grabber\MercurialGrabber.exe"C:\Users\Admin\Downloads\Mercurial.Grabber\MercurialGrabber.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Checks SCSI registry key(s)
- Enumerates system info in registry
PID:308
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\Mercurial.Grabber\readme.txt1⤵
- Opens file in notepad (likely ransom note)
PID:4276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5b31c8f16ea80ef4f17f2ac3c03179ace
SHA1cd39c4751379f038dc3be151b668ff9d39c89d07
SHA2563969ca7f9ab30c63032a2f9eef65f657ac136f87f1b476c434c02358c2a73df2
SHA51224e07d6e914ee7d6e74983f8e3024f2b8db3242fe8d84850d09f730f2462bf059420ca478e543d7815ef2a10ea81eadd3491f4b04ac13d51cb0d0e7a5ad9ceee
-
Filesize
1018B
MD509a6dfd95dbacc7f1516ac3250ab56ff
SHA1d80a9320bf1c5a01ca1e5228ccef11b68d14b5ac
SHA2560e5b3b96015f6ae6d1c9fa5af9b228909632b426e9846f0a221c67de44be11ba
SHA51257e315bbaa44b7cef7e0e2d514df75eaff5cb7926bb0e425990403b4a52731ffbcf73185b6f181398e65a6071720bd9badeca6d345ca9a25b7c4effc67637057
-
Filesize
1KB
MD55cf63eaee6c76c016abc51e8db5dbe0e
SHA1ee4ce53de27e5420ba2a9656ece41b1bbd89f0b6
SHA25643ff8481b4d06254ff66f0d95bab769b2a97e42e749a3ae412ff309f3421846f
SHA5127672ba85fd0f33edb6669954c7fc8c729a56ac2d8e5cc7d455dc954701e54492e898d4115611fd04da790c841b24146956b215c5da5eb5497e8064977f2da5b4
-
Filesize
702B
MD556987185599573846d6c2a8c892ab11e
SHA1f6926deababdaff32ff6fb019e55f479b98c2cd0
SHA256852e58a9cc591f3905a469dfcedbcdc38ef643ceb2cbb86fbc7c7d0337d1119e
SHA512335a3bac232d22de61b64453a7339e5a9afb576d4b33f6c4014c2ebc6af0bb6f15e507d1788a2425667ba4695518921e3e6525e6bd2624992dea82407b838db7
-
Filesize
1KB
MD52df1d4c7e81fe4090fbcd85d15c2f193
SHA13ed10d473a62c418da3f4e3d49320c370552bf18
SHA25682c516e600c73c750b2043f670081e84fb5363cf64a555f6a7e0d4defcffefcc
SHA5121a5dc37208e99bdad8d3c5209d7005100131e1498825697d91dfb93910e656f74c4808273a9232a71fb51f656c75204e24509b9df55580b1e2c13af7282b8acb
-
Filesize
1KB
MD514838101dbae8b3b7f5a407773a94d9b
SHA1184b3b224834d542381ffe0905a0672bb3fd4a21
SHA2566bdec9bbf6098587fed9d719d62aa7341d86526996c9aa104613379b55273e3c
SHA51245ed6ce8e58f7740080d3b728c6bfc361fe4fd159f5ba81d363da31f4d6ea889b0840b7d80eb53fd6ecfb918bfa9923c9b697662f9a75852a5b71807042b0471
-
Filesize
6KB
MD53199e98e35864d552c44cde4d1a1f1a7
SHA1670b1329d6747e9095451b876bd6cbe3977269e5
SHA25672e9869fc70532e913635d86b0a053b528bc16b3a441f5312e108ef4c25f1161
SHA5121cea659490e635685b60552d5099cfa0ef18ff51c4eee4ed262c70241aa3454a3b6cb61102e0f3b3acdd2b25830bbd01ea4e08dbe75baec05a6234a59e2a0e15
-
Filesize
5KB
MD578350d1fc5613d0585c547cc95e89544
SHA14308ee3890ebf78e5733d17a6e99f9b44cd658cb
SHA256884a636d0cba87558e9a2a72b8a0300049d7c3fe47b6bb33758c1d758b4b9556
SHA512fe310796b4e4fefa48760d364ba08c15233e32bd592d9a6ff0c47d68891ccd8965f103d28c4058711aaeb2bb986273bcd1452bce7f390f919d12fd6c6f29974c
-
Filesize
6KB
MD5b052749a59879371dc29e2d5c6e19408
SHA19356d7dc9ab92e90ee25ab867633f1ada65eda7a
SHA256fe10df19559dcbd913e8a78d754d0ffac09fc4d20c5d0740e018bea90f1e1e19
SHA5126dc04fbc1fbd3815a85680e9c68e0791027729820245bf8be0e70dee49a4f02df7cff202d1bfaab55f0d2f1f77d86db1bb39046b47936b57b5722179d04d2f41
-
Filesize
5KB
MD5f94641f942800ef5a58d21fccbb6b968
SHA1003f1726d09cb7b6f6a954933af698023d32fa78
SHA256b5cab3c02df6132379f6f861a945c8221911e3ee56d1eb6927de091ba567a7da
SHA512e18f836878ce63529be31633bec14e0dfbd8565a3446bab2612954b81e042919c7e8c6870d58c8eb886085115bdb5e9384359f2a2ef86d66a6f08aa0d2a955b1
-
Filesize
136KB
MD5755dcd0c0b94dde4a8a6c83119e56172
SHA19a3f59a22bd88817a45e11b46b1be448428232b2
SHA256a5b07ea7dea28e20c4cb40c260de22e9aa01bbfae8500c940de267e58519aa27
SHA512551a40f0c523c1ce8486831c0011b3411545796e927e31bf26bc74922e319f19eea65f32fe2a317549aff0a18ad3aba79b9e21f53672c11a35b128983926816a
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
42B
MD584cfdb4b995b1dbf543b26b86c863adc
SHA1d2f47764908bf30036cf8248b9ff5541e2711fa2
SHA256d8988d672d6915b46946b28c06ad8066c50041f6152a91d37ffa5cf129cc146b
SHA512485f0ed45e13f00a93762cbf15b4b8f996553baa021152fae5aba051e3736bcd3ca8f4328f0e6d9e3e1f910c96c4a9ae055331123ee08e3c2ce3a99ac2e177ce