Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
15-08-2024 08:59
Behavioral task
behavioral1
Sample
an exe file.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
an exe file.exe
Resource
win10v2004-20240802-en
General
-
Target
an exe file.exe
-
Size
42KB
-
MD5
84fef232765948eb3fe800c075d64aae
-
SHA1
aa87e13ef08b5101e62423b0d2141b0836459568
-
SHA256
72d81f64e67472c40e476981d1bb332aff4c2d54efaa13c46d44d65e4a276d73
-
SHA512
aaad4d1cd287977c2c551c191029d9e2b22e348927f2088d4e795431d1f2f56ec545b50f76d1ca1386f607554869e32620291d9784ec859754f02442c8aea57c
-
SSDEEP
768:xQNs4lMmcAimpnuZWLlFTjJTKZKfgm3EhZY:NAjpLLlFTtTF7EDY
Malware Config
Extracted
mercurialgrabber
https://discordapp.com/api/webhooks/1273528799975178250/k3-e4i6IdHPaytIAwEwuS5hzRdRJWxyM-6BVPlRJ3eK7KJeyFPPofFqx5lS1TKYwcl9E
Signatures
-
Mercurial Grabber Stealer
Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip4.seeip.org 6 ip-api.com -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString an exe file.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 an exe file.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2888 an exe file.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2888 wrote to memory of 2488 2888 an exe file.exe 32 PID 2888 wrote to memory of 2488 2888 an exe file.exe 32 PID 2888 wrote to memory of 2488 2888 an exe file.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\an exe file.exe"C:\Users\Admin\AppData\Local\Temp\an exe file.exe"1⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2888 -s 14002⤵PID:2488
-