Resubmissions
18-08-2024 11:58
240818-n5ltfssgpb 1009-08-2024 18:46
240809-xe5nbathlk 1009-08-2024 17:51
240809-wfdesaxcqh 1009-08-2024 17:48
240809-wdej3axcpf 1009-08-2024 17:46
240809-wcf2haxcpc 10Analysis
-
max time kernel
25s -
max time network
25s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09-08-2024 17:48
Behavioral task
behavioral1
Sample
Garnacho.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Garnacho.exe
Resource
win10v2004-20240802-en
General
-
Target
Garnacho.exe
-
Size
42KB
-
MD5
86f50736cb36ef4c1f635480221db309
-
SHA1
4e1a9cee359def9f13a9526e6777433df44448d4
-
SHA256
e1d670f21441ec457fe5c3469781c101c36b4fe04b2ffc1a2e89eb630ff0165a
-
SHA512
656f582f51531bf0d23d0b17eed991b2286504d69a13c431adfd391c81f32718775d934711af897db0670771c0f9bb51f8fc44b6486351f275b52bbebc0067e3
-
SSDEEP
768:ciSb4etQDGm88uZGLTOTjGKZKfgm3Ehcy:ct4SQD84LTOTyF7ESy
Malware Config
Extracted
mercurialgrabber
https://discord.com/api/webhooks/1271524572986081351/vNrcEfNWPV35KkYiGtVh2NaZB_4a4uGfbaOAe2oVr7jGqwHkIB78Aj1CzHbPqMm3KbjD
Signatures
-
Mercurial Grabber Stealer
Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions Garnacho.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\VMWare, Inc.\VMWare Tools Garnacho.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Garnacho.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 8 discord.com 9 discord.com 10 discord.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip4.seeip.org 6 ip-api.com -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum Garnacho.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 Garnacho.exe -
Checks SCSI registry key(s) 3 TTPs 1 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_VMware_&Prod_VMware_Virtual_S Garnacho.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Garnacho.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Garnacho.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosInformation Garnacho.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemManufacturer Garnacho.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemProductName Garnacho.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Logical Unit Id 0 Garnacho.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1020 Garnacho.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1020 wrote to memory of 2608 1020 Garnacho.exe 31 PID 1020 wrote to memory of 2608 1020 Garnacho.exe 31 PID 1020 wrote to memory of 2608 1020 Garnacho.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Garnacho.exe"C:\Users\Admin\AppData\Local\Temp\Garnacho.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Checks SCSI registry key(s)
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1020 -s 14002⤵PID:2608
-