Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
03-08-2024 04:22
Behavioral task
behavioral1
Sample
03-08-2024_hYQnEY98kzONexB.rar
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
ValoTestAndProof_Shift_trigger/!TUTORIAL! - READ!.txt
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
ValoTestAndProof_Shift_trigger/RUN THIS.bat
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
ValoTestAndProof_Shift_trigger/config.ini
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
ValoTestAndProof_Shift_trigger/files.exe
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
ValoTestAndProof_Shift_trigger/mapper.exe
Resource
win11-20240802-en
General
-
Target
ValoTestAndProof_Shift_trigger/RUN THIS.bat
-
Size
31B
-
MD5
e14e187f77a9609b03954baaec78914c
-
SHA1
e5f08e9a0c97d71ee0c4bfa2c4129611615e61ec
-
SHA256
49fe2a8d6e450608ab45236f3f787519a9c536f20b6cefe14463a264e22aa683
-
SHA512
765f27071ff2d4c688c758ac2196a5336b938e0ebac400582c50fcb3394b0d6e85cc0e8a5b912eda23429159a84ae94cb8a807a0f4c601e27cbfc3222d847422
Malware Config
Extracted
mercurialgrabber
https://discord.com/api/webhooks/887304484844339250/sTQt9knbeiUf2bJPMZ4uxOEZ2mFmxtbw1S3JZvhKpMU-hSQtSzNllJidmjM8oJmI2wpt
Signatures
-
Mercurial Grabber Stealer
Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions mapper.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\VMWare, Inc.\VMWare Tools mapper.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion mapper.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 8 discord.com 1 discord.com 7 discord.com -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip4.seeip.org 2 ip4.seeip.org 5 ip-api.com -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum mapper.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 mapper.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language files.exe -
Checks SCSI registry key(s) 3 TTPs 1 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_VMware_&Prod_VMware_Virtual_S mapper.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 mapper.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString mapper.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosInformation mapper.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemManufacturer mapper.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemProductName mapper.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Logical Unit Id 0 mapper.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3156 mapper.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4652 files.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 4652 files.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4652 files.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4324 wrote to memory of 3156 4324 cmd.exe 82 PID 4324 wrote to memory of 3156 4324 cmd.exe 82 PID 4324 wrote to memory of 4652 4324 cmd.exe 87 PID 4324 wrote to memory of 4652 4324 cmd.exe 87 PID 4324 wrote to memory of 4652 4324 cmd.exe 87
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ValoTestAndProof_Shift_trigger\RUN THIS.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\ValoTestAndProof_Shift_trigger\mapper.exemapper.exe2⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Checks SCSI registry key(s)
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:3156
-
-
C:\Users\Admin\AppData\Local\Temp\ValoTestAndProof_Shift_trigger\files.exefiles.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4652
-