Analysis
-
max time kernel
55s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
27-04-2024 22:58
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/RobloxGrabber/MercurialGrabber
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
https://github.com/RobloxGrabber/MercurialGrabber
Resource
win7-20240215-en
Behavioral task
behavioral3
Sample
https://github.com/RobloxGrabber/MercurialGrabber
Resource
win10v2004-20240426-en
General
-
Target
https://github.com/RobloxGrabber/MercurialGrabber
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2296 chrome.exe 2296 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe Token: SeShutdownPrivilege 2296 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe 2296 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2296 wrote to memory of 1856 2296 chrome.exe 28 PID 2296 wrote to memory of 1856 2296 chrome.exe 28 PID 2296 wrote to memory of 1856 2296 chrome.exe 28 PID 2296 wrote to memory of 2720 2296 chrome.exe 30 PID 2296 wrote to memory of 2720 2296 chrome.exe 30 PID 2296 wrote to memory of 2720 2296 chrome.exe 30 PID 2296 wrote to memory of 2720 2296 chrome.exe 30 PID 2296 wrote to memory of 2720 2296 chrome.exe 30 PID 2296 wrote to memory of 2720 2296 chrome.exe 30 PID 2296 wrote to memory of 2720 2296 chrome.exe 30 PID 2296 wrote to memory of 2720 2296 chrome.exe 30 PID 2296 wrote to memory of 2720 2296 chrome.exe 30 PID 2296 wrote to memory of 2720 2296 chrome.exe 30 PID 2296 wrote to memory of 2720 2296 chrome.exe 30 PID 2296 wrote to memory of 2720 2296 chrome.exe 30 PID 2296 wrote to memory of 2720 2296 chrome.exe 30 PID 2296 wrote to memory of 2720 2296 chrome.exe 30 PID 2296 wrote to memory of 2720 2296 chrome.exe 30 PID 2296 wrote to memory of 2720 2296 chrome.exe 30 PID 2296 wrote to memory of 2720 2296 chrome.exe 30 PID 2296 wrote to memory of 2720 2296 chrome.exe 30 PID 2296 wrote to memory of 2720 2296 chrome.exe 30 PID 2296 wrote to memory of 2720 2296 chrome.exe 30 PID 2296 wrote to memory of 2720 2296 chrome.exe 30 PID 2296 wrote to memory of 2720 2296 chrome.exe 30 PID 2296 wrote to memory of 2720 2296 chrome.exe 30 PID 2296 wrote to memory of 2720 2296 chrome.exe 30 PID 2296 wrote to memory of 2720 2296 chrome.exe 30 PID 2296 wrote to memory of 2720 2296 chrome.exe 30 PID 2296 wrote to memory of 2720 2296 chrome.exe 30 PID 2296 wrote to memory of 2720 2296 chrome.exe 30 PID 2296 wrote to memory of 2720 2296 chrome.exe 30 PID 2296 wrote to memory of 2720 2296 chrome.exe 30 PID 2296 wrote to memory of 2720 2296 chrome.exe 30 PID 2296 wrote to memory of 2720 2296 chrome.exe 30 PID 2296 wrote to memory of 2720 2296 chrome.exe 30 PID 2296 wrote to memory of 2720 2296 chrome.exe 30 PID 2296 wrote to memory of 2720 2296 chrome.exe 30 PID 2296 wrote to memory of 2720 2296 chrome.exe 30 PID 2296 wrote to memory of 2720 2296 chrome.exe 30 PID 2296 wrote to memory of 2720 2296 chrome.exe 30 PID 2296 wrote to memory of 2720 2296 chrome.exe 30 PID 2296 wrote to memory of 2616 2296 chrome.exe 31 PID 2296 wrote to memory of 2616 2296 chrome.exe 31 PID 2296 wrote to memory of 2616 2296 chrome.exe 31 PID 2296 wrote to memory of 2624 2296 chrome.exe 32 PID 2296 wrote to memory of 2624 2296 chrome.exe 32 PID 2296 wrote to memory of 2624 2296 chrome.exe 32 PID 2296 wrote to memory of 2624 2296 chrome.exe 32 PID 2296 wrote to memory of 2624 2296 chrome.exe 32 PID 2296 wrote to memory of 2624 2296 chrome.exe 32 PID 2296 wrote to memory of 2624 2296 chrome.exe 32 PID 2296 wrote to memory of 2624 2296 chrome.exe 32 PID 2296 wrote to memory of 2624 2296 chrome.exe 32 PID 2296 wrote to memory of 2624 2296 chrome.exe 32 PID 2296 wrote to memory of 2624 2296 chrome.exe 32 PID 2296 wrote to memory of 2624 2296 chrome.exe 32 PID 2296 wrote to memory of 2624 2296 chrome.exe 32 PID 2296 wrote to memory of 2624 2296 chrome.exe 32 PID 2296 wrote to memory of 2624 2296 chrome.exe 32 PID 2296 wrote to memory of 2624 2296 chrome.exe 32 PID 2296 wrote to memory of 2624 2296 chrome.exe 32 PID 2296 wrote to memory of 2624 2296 chrome.exe 32 PID 2296 wrote to memory of 2624 2296 chrome.exe 32
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/RobloxGrabber/MercurialGrabber1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7229758,0x7fef7229768,0x7fef72297782⤵PID:1856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1160 --field-trial-handle=1140,i,11065049156627319759,5658956889394746027,131072 /prefetch:22⤵PID:2720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1504 --field-trial-handle=1140,i,11065049156627319759,5658956889394746027,131072 /prefetch:82⤵PID:2616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1528 --field-trial-handle=1140,i,11065049156627319759,5658956889394746027,131072 /prefetch:82⤵PID:2624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2188 --field-trial-handle=1140,i,11065049156627319759,5658956889394746027,131072 /prefetch:12⤵PID:2456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2208 --field-trial-handle=1140,i,11065049156627319759,5658956889394746027,131072 /prefetch:12⤵PID:2464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=2772 --field-trial-handle=1140,i,11065049156627319759,5658956889394746027,131072 /prefetch:22⤵PID:2144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3464 --field-trial-handle=1140,i,11065049156627319759,5658956889394746027,131072 /prefetch:82⤵PID:944
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c04f6558fdb6887d71c30c2628ac600b
SHA1728a221a6ea14b59b859094afedf49ac9449d751
SHA2563c6251fb16fc057499252002249a44607f262c798463568b7b58cde6f73bfef1
SHA512d19c622c73bb4d0a9aba894159bcea80a63da255bc97315a2bc8e23ae22c89c9684a1d5f6eefecc344dbc6e9bb3523b09711aa76445e4ed5f88c63ba2b8e2b71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570a41e913a9bdafdf4c59eabd9a558ff
SHA1f6833bd52149fb62761e2ff10225c0f0cf679485
SHA25605e9f66608cad313f035488761eac7d252ca3b0b3855012215d775dd50dd2ce0
SHA512e8561995fde526678f33b17cfb2311a9bf25ed72c27d312f6bf07c8249d1194312fc8c37357f9f6936dd5fb5f3f11400949ad83a0a83fefe01b2db7a78dc4396
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507ce3adeec1c30886452e6fa626e8316
SHA114493d4c2a4963076ceed1c8a52f9d1058f7f493
SHA25607f7af3dad74f21b9fde461088b620b948e3b1f3dd44808378f02c7f9c0b3af9
SHA5123f15f582e0a42d36a601cc991748c76e4209925349270a635713c246966b11b7736d09c229cae19e2881eeed1cfeb4b566d359f74ef98a0d9c0f4be7c6507cae
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
987B
MD596cc41d32df3baac9e8a1eb1e4afadaf
SHA1ab9c77e603abca6f5361b878f0d57ba0108b656d
SHA256a6267c44d503e876794b152b52bce0b1a95cc7f86899f39994284d060bd3850c
SHA512b144cfcbd953433114baa801658a7e67b472c81c54600a280ba6d83a0992d20851dc29c98384eb823200cdc07c1f7ff1606c579df65d2c4f197e2ee6daefc144
-
Filesize
524B
MD5fe182a77cfcffa1a5694abe123216fe0
SHA1998ee0fb17fcf91aedc537923b5a13fec0e28165
SHA25666584b5ffcb09ac7c6094ff17b45657b80970ddabfff5823297efe8c1adccd17
SHA512f11b43c6b0d4af2024b79f96a025a1cc14f2a825f4b917a0e0c11e9b6e41b6a61d3e01d6c5531d63855ab770da80b955e15dc92f9f5da1e1de68741788858c4e
-
Filesize
5KB
MD5ab27162bbd62228cb36c655ab102f602
SHA1702995ec97db0d166f08303c8cf9d5ec66488911
SHA25623a87444be12a7b9a62c267db2629bdb504e210eaca9eb79411e906a8931b832
SHA512e3fce95881e315d31384df68114d8dc9ec3fa5d734b39459c21ef927e3cb67f1d073ceea31a71fc1fff2d38b6522041c9e9435618589cfa788d7850c91246b30
-
Filesize
6KB
MD5d8a689ca7e3f493ba6412ecd091bbbb2
SHA13fae9c2e6a66f94cceade3d5591c2c26818f8351
SHA25626830938067347840c0e87f749b23e20c89f95900664a5b8945d75a8ce60c0d9
SHA512b296d99c4f4f6e602c54711f1b695f48f440ccfbc4d88e45950bc598da80ea9cdec89b1cd3226363f6e8fab320ad4f956021c2f48bac15b08fc670c0a606befa
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a