Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2024 08:32
Behavioral task
behavioral1
Sample
6ed782d7c506c1bc4b48f7777b2e61ed_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6ed782d7c506c1bc4b48f7777b2e61ed_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6ed782d7c506c1bc4b48f7777b2e61ed_JaffaCakes118.exe
-
Size
42KB
-
MD5
6ed782d7c506c1bc4b48f7777b2e61ed
-
SHA1
39b8bc345a681d0dd50e7e73d88b2a08c7f55182
-
SHA256
b0f180f9a10c0a67bbb9e93c49e7e5cee87a83c59e7926d7bd8b89801a2db8d7
-
SHA512
1b74dbcd9a3ce900ee0a900333e852ea58a6a4e41325744362daa501f8c95abdbeabbc32fd00ffc9f29b3bd9d3699d69a67b6623fbe88fac5084681a90bb86e2
-
SSDEEP
768:zRmLvZ8DylO8wuZHLNaTj9KZKfgm3EhyE:Uj6D98dLNaThF7EYE
Malware Config
Extracted
mercurialgrabber
https://discord.com/api/webhooks/894259685274841180/ngfBaQeVxACr5Og8svG2A6bUi3RntYVe5d7lRbZAiwXVUA-GlvW0v253fEq_kqWi4SRd
Signatures
-
Mercurial Grabber Stealer
Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 29 discord.com 30 discord.com 32 discord.com -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ip4.seeip.org 4 ip4.seeip.org 27 ip-api.com -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 6ed782d7c506c1bc4b48f7777b2e61ed_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 6ed782d7c506c1bc4b48f7777b2e61ed_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4740 6ed782d7c506c1bc4b48f7777b2e61ed_JaffaCakes118.exe