Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
01-09-2024 17:14
Static task
static1
Behavioral task
behavioral1
Sample
Screenshot_10.png
Resource
win11-20240802-en
General
-
Target
Screenshot_10.png
-
Size
273KB
-
MD5
ecf6ec480feb44034bc99d60f7723eef
-
SHA1
bc58ff0d4ea455b944b2615078076dfd3113d2d0
-
SHA256
77da925157321355fa400b6727269a53fe4bc5c9b269b9a1a1c153656dfb6652
-
SHA512
7bc8ff3da9421cb4422473012295670f2e3d099f23fb7a40028e29317906b7a8b62f3b75d2697b53e7557d8a3c3b2716048db7a5737a2c44cbd6a69f182dd938
-
SSDEEP
6144:S3KQgHeQmCNUvJZ5J5zdU0+zNLIPZSx6n4COvKYD0u:RQg+QDNSj5zdmwSk454u
Malware Config
Extracted
mercurialgrabber
https://discord.com/api/webhooks/1279845453336412260/A8ZEV41SqZhlDM114ONplW6YO3ItmaeJxvYHi-I4t5Fx0r_sBuCyg8RH2hoVGdxkr27c
Signatures
-
Mercurial Grabber Stealer
Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions merc.exe -
Downloads MZ/PE file
-
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\VMWare, Inc.\VMWare Tools merc.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion merc.exe -
Executes dropped EXE 1 IoCs
pid Process 5088 merc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 50 discord.com 51 discord.com 48 discord.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 48 ip-api.com 3 ip4.seeip.org -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum merc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 merc.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_01cf530faf2f1752\display.PNF chrome.exe File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_01cf530faf2f1752\display.PNF chrome.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File opened for modification C:\Users\Admin\Downloads\merc.exe:Zone.Identifier chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_VMware_&Prod_VMware_Virtual_S merc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 merc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString merc.exe -
Enumerates system info in registry 2 TTPs 7 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemManufacturer merc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemProductName merc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Logical Unit Id 0 merc.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosInformation merc.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133696845145416055" chrome.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\merc.exe:Zone.Identifier chrome.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 3212 chrome.exe 3212 chrome.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 3588 chrome.exe 3588 chrome.exe 3588 chrome.exe 3588 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe Token: SeShutdownPrivilege 3212 chrome.exe Token: SeCreatePagefilePrivilege 3212 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe -
Suspicious use of SendNotifyMessage 50 IoCs
pid Process 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe 1816 taskmgr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3212 wrote to memory of 3572 3212 chrome.exe 91 PID 3212 wrote to memory of 3572 3212 chrome.exe 91 PID 3212 wrote to memory of 1944 3212 chrome.exe 92 PID 3212 wrote to memory of 1944 3212 chrome.exe 92 PID 3212 wrote to memory of 1944 3212 chrome.exe 92 PID 3212 wrote to memory of 1944 3212 chrome.exe 92 PID 3212 wrote to memory of 1944 3212 chrome.exe 92 PID 3212 wrote to memory of 1944 3212 chrome.exe 92 PID 3212 wrote to memory of 1944 3212 chrome.exe 92 PID 3212 wrote to memory of 1944 3212 chrome.exe 92 PID 3212 wrote to memory of 1944 3212 chrome.exe 92 PID 3212 wrote to memory of 1944 3212 chrome.exe 92 PID 3212 wrote to memory of 1944 3212 chrome.exe 92 PID 3212 wrote to memory of 1944 3212 chrome.exe 92 PID 3212 wrote to memory of 1944 3212 chrome.exe 92 PID 3212 wrote to memory of 1944 3212 chrome.exe 92 PID 3212 wrote to memory of 1944 3212 chrome.exe 92 PID 3212 wrote to memory of 1944 3212 chrome.exe 92 PID 3212 wrote to memory of 1944 3212 chrome.exe 92 PID 3212 wrote to memory of 1944 3212 chrome.exe 92 PID 3212 wrote to memory of 1944 3212 chrome.exe 92 PID 3212 wrote to memory of 1944 3212 chrome.exe 92 PID 3212 wrote to memory of 1944 3212 chrome.exe 92 PID 3212 wrote to memory of 1944 3212 chrome.exe 92 PID 3212 wrote to memory of 1944 3212 chrome.exe 92 PID 3212 wrote to memory of 1944 3212 chrome.exe 92 PID 3212 wrote to memory of 1944 3212 chrome.exe 92 PID 3212 wrote to memory of 1944 3212 chrome.exe 92 PID 3212 wrote to memory of 1944 3212 chrome.exe 92 PID 3212 wrote to memory of 1944 3212 chrome.exe 92 PID 3212 wrote to memory of 1944 3212 chrome.exe 92 PID 3212 wrote to memory of 1944 3212 chrome.exe 92 PID 3212 wrote to memory of 932 3212 chrome.exe 93 PID 3212 wrote to memory of 932 3212 chrome.exe 93 PID 3212 wrote to memory of 4004 3212 chrome.exe 94 PID 3212 wrote to memory of 4004 3212 chrome.exe 94 PID 3212 wrote to memory of 4004 3212 chrome.exe 94 PID 3212 wrote to memory of 4004 3212 chrome.exe 94 PID 3212 wrote to memory of 4004 3212 chrome.exe 94 PID 3212 wrote to memory of 4004 3212 chrome.exe 94 PID 3212 wrote to memory of 4004 3212 chrome.exe 94 PID 3212 wrote to memory of 4004 3212 chrome.exe 94 PID 3212 wrote to memory of 4004 3212 chrome.exe 94 PID 3212 wrote to memory of 4004 3212 chrome.exe 94 PID 3212 wrote to memory of 4004 3212 chrome.exe 94 PID 3212 wrote to memory of 4004 3212 chrome.exe 94 PID 3212 wrote to memory of 4004 3212 chrome.exe 94 PID 3212 wrote to memory of 4004 3212 chrome.exe 94 PID 3212 wrote to memory of 4004 3212 chrome.exe 94 PID 3212 wrote to memory of 4004 3212 chrome.exe 94 PID 3212 wrote to memory of 4004 3212 chrome.exe 94 PID 3212 wrote to memory of 4004 3212 chrome.exe 94 PID 3212 wrote to memory of 4004 3212 chrome.exe 94 PID 3212 wrote to memory of 4004 3212 chrome.exe 94 PID 3212 wrote to memory of 4004 3212 chrome.exe 94 PID 3212 wrote to memory of 4004 3212 chrome.exe 94 PID 3212 wrote to memory of 4004 3212 chrome.exe 94 PID 3212 wrote to memory of 4004 3212 chrome.exe 94 PID 3212 wrote to memory of 4004 3212 chrome.exe 94 PID 3212 wrote to memory of 4004 3212 chrome.exe 94 PID 3212 wrote to memory of 4004 3212 chrome.exe 94 PID 3212 wrote to memory of 4004 3212 chrome.exe 94 PID 3212 wrote to memory of 4004 3212 chrome.exe 94 PID 3212 wrote to memory of 4004 3212 chrome.exe 94
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Screenshot_10.png1⤵PID:928
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:752
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff80cb8cc40,0x7ff80cb8cc4c,0x7ff80cb8cc582⤵PID:3572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1952,i,11378605805602622544,4652119235789407069,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1948 /prefetch:22⤵PID:1944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1764,i,11378605805602622544,4652119235789407069,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1988 /prefetch:32⤵PID:932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2156,i,11378605805602622544,4652119235789407069,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2168 /prefetch:82⤵PID:4004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3120,i,11378605805602622544,4652119235789407069,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3128 /prefetch:12⤵PID:880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3136,i,11378605805602622544,4652119235789407069,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:3016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3552,i,11378605805602622544,4652119235789407069,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4492 /prefetch:12⤵PID:2416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4640,i,11378605805602622544,4652119235789407069,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4472 /prefetch:82⤵PID:2424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4952,i,11378605805602622544,4652119235789407069,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4968 /prefetch:82⤵PID:3888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=212,i,11378605805602622544,4652119235789407069,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4392 /prefetch:12⤵PID:32
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=4624,i,11378605805602622544,4652119235789407069,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4756 /prefetch:12⤵PID:4384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=4736,i,11378605805602622544,4652119235789407069,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:2200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=4936,i,11378605805602622544,4652119235789407069,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4524 /prefetch:12⤵PID:3864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=4336,i,11378605805602622544,4652119235789407069,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4552 /prefetch:12⤵PID:1708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5348,i,11378605805602622544,4652119235789407069,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5360 /prefetch:82⤵PID:3320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=3760,i,11378605805602622544,4652119235789407069,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4548 /prefetch:82⤵PID:4716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4484,i,11378605805602622544,4652119235789407069,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5388 /prefetch:82⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- NTFS ADS
PID:1084
-
-
C:\Users\Admin\Downloads\merc.exe"C:\Users\Admin\Downloads\merc.exe"2⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Executes dropped EXE
- Maps connected drives based on registry
- Checks SCSI registry key(s)
- Checks processor information in registry
- Enumerates system info in registry
PID:5088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1172,i,11378605805602622544,4652119235789407069,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4612 /prefetch:82⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3588
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2500
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1820
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1816
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5b5ad5caaaee00cb8cf445427975ae66c
SHA1dcde6527290a326e048f9c3a85280d3fa71e1e22
SHA256b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8
SHA51292f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
1008B
MD5d222b77a61527f2c177b0869e7babc24
SHA13f23acb984307a4aeba41ebbb70439c97ad1f268
SHA25680dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747
SHA512d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\1bbf1708-1ee3-4beb-94f0-85d42a26aafc.tmp
Filesize15KB
MD5a768c48cfc5cbd4861b520b8c21e9d73
SHA1d69c1f25cd0796c94e930131c3f6ddd7e84b35d0
SHA2560c11f52ab08fad390e494807e363d1fc40bfeccee158ad0d5683c37fb2c9e419
SHA512d11df9c7edd2cc7757425f6ccaa6c8d13bf610d03b44f74cf1440d80dae413bdc923471b23bff23eb9df0c8f22672ca51728916223c99808f446160711220bea
-
Filesize
649B
MD5e9b9943974d0846ec5fa8a4bdd1a94d9
SHA1b39a4b5dd96493ef25c8a92df057b4286ca36b1a
SHA2565cde3889703cbbd70b8c9593a63f1a1e9aa22400d7b14630b86b38485e887416
SHA51275500822188dcce35ae49d057a9304d4e31755e2ac1e5415a692566aa2401dc9f90ff252836be59dae6e58538095e8bb6c89437259578e88ff9b03680ff77d2a
-
Filesize
480B
MD5a3de38ac153350cfb87042e75ca57f0f
SHA137550ca03771d59367463bf34f894e489be30e94
SHA25615a20b7ae654d7a46ffbde50774a652ca34e5ee9f625c07791fdeceae4d7a6b0
SHA512a2431d78b915fdafc8ae2c254d8ca9e9127a7e9b9c684cb5039c8c2637cec39a282da5532287bd3bdadf1ab3b922d455fc918dc2a47d90c64c2091cc46c1d560
-
Filesize
336B
MD50c8c2a99b72f997bb0e00e096e776e90
SHA1b7d464eec05fdcefa24ed634c6c7ebd67368dff3
SHA25639a717983a9593b22983a03835b8cd1211c994cd3d8ad10acdcf1f6f30e1f781
SHA51275f388a3aa7b08adac474aac5e7c17f4e928fe282897b457cfe6b229bbed8b9f62e90d128178ade5ddd9ed49a2b7c084deed097fdaff7ab9b372a3d3dc11e95d
-
Filesize
3KB
MD578c3524d05028d56741e66ee02fef57a
SHA11d495d5ddae50b593f0ff5f21b67f45d8692e109
SHA256bedcd9cfa36c7b688114966d33cc38a882c07af4919140989b5dd8704f3d191e
SHA5126f949b7a7c1cf6ce786bb0829ff681fbfc28be009ff8f6901975631ccfbe9746ab9852b5bcc7ea004aeef1867ecede10cb148bef849d017ec412580505f8d76d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5172eb024b22ec4a594956f16792ffca9
SHA1cb77b07006b02dfca5696b0e31d771e9c132ca01
SHA256942eb4f15c12bd9c55f4321a76802f9a79df554ef42b71880b6c18f2e663e4e2
SHA5125fb3414a424eb0f2d38fcd061ad1e1e5c359f0b24d8d22fae0d65cb9b6b44870d49ec14000a8aa35d6c6bab74596429cb30a534a53da0b142a6c10c32e9beb3d
-
Filesize
854B
MD57b176509cb3daa8ba6d77307d1aa5119
SHA1074372fe43a4c6eba0addbf1d1e5109e25e9302f
SHA25692cd49aa1fa712bba09de442f30afc8117c976ca453c9aa7278de3cc7550bf27
SHA512d0c1b38a83e0ae772843b426042f770f3c4fe83729be122b106ea2ccbd9529768623a3aa6cf71debe1814749fa1c6b866976617e6da45db6728c8c6a0fcc5087
-
Filesize
858B
MD5fb9dffbcacfc1db8f85e1b4fb12ffd1f
SHA1a35dcea6d9c512d0d018c940f52b7d3e6bc0387e
SHA256747ed3d067850366ee6fe5f823312554dea551d4bdda27c45dfe6ff323ec92ae
SHA51292e00abeac06b0d98431fa7dc0660864963f696b57d4027ca24383e9bec065677166935f2b7a9ff34b86590c06ab251b9763d2fd4f434be45319b714f4133567
-
Filesize
9KB
MD54e685aeaef57b8b3137b592e195d2596
SHA1df995497471f4cca84900d7f4d07f1f37cf9da53
SHA256f044640fd3f4969a80221acbc23041f9f9827b726d77df3ca6e5c51ed7fbe78e
SHA512555aa41d0a7c8996216ffe544bbbf3dfbc0685266672ff8291b93b7ce9a410758f3c527ac7f534a719ce009001e78901c63e92b0a953d4de52698d3c0c285816
-
Filesize
9KB
MD5940934cc01188f2c7fe11051dea6feee
SHA131bbdc5880009f2a42451d587cb851512b6549aa
SHA2562264cd172f419bd31cb18942d25686653a2732ae3e3b56705b99c8136ac0daf9
SHA51250cac892296dee7fcd70bc6fc4145918687d6d559b0011f8561563dcac7caa93de4eca862d5e3c52cc17d19a978e4a2a38490be62fd2126cc99bccbf75297259
-
Filesize
9KB
MD5387d742a3b5d984990645be2ba0bc3ce
SHA1ddb7316243e3a6e5a3289eb88b4989edfcba0cf2
SHA25626b92cb04d38cd0745777cb07f3f2238193471a9e083889236327d910f42260c
SHA51210505f8a94bfb948c5dde1521ed1016eb86421d5104cbcd1bfc6c3067f7b329c8cde3fd329a200ec3a62f561c55943db9167ffcbd61a586f3af73655ed37c92a
-
Filesize
9KB
MD522e1ef9560b1d88b7d6406abb37f5d8b
SHA184233330118ece0b3503ac2bdc94a107a515e1f6
SHA25610ba1774c85476830cd256c8b7c4e5835721061c840656aa4645802679949d28
SHA51223e92fcd72f7815c7ec4addcc1d3c6a624d9e028fc7ec900808d1d9bc898c1702bcc00b1e2ee8573f2d19c0f5bd16a8e2c34348ef29814e52c470df01b01f625
-
Filesize
9KB
MD50895f2de8eca049af3d302e20e848e66
SHA1fc229b502c000108ba10182a33f0d03f6435ac29
SHA25645b0724b77a27a35915cca9f42625c057b10f456b19320b5cb4267ab585340de
SHA512b171019c8ecb8d6c4be966d4416ec0d627d643344a72d57c3fc822f8b6f125ee83daec760f3b4a29beb7b911ee728e016ea1af828927f790ed08aeba300fa790
-
Filesize
9KB
MD51f257f26c22e871d8d1223c89aaefc61
SHA14c14de19d8d69cc9d049a685bed38e4ee24c8d0b
SHA256cf14e016e9dbaf043b491f43b7e1357ddd6f105d9dd6ea9b4669060937b82f11
SHA512424299429f07ea03c0cb5878713f0228771c97326c44877180739092023ed72e070f6b20a33f29462e57bad2d3ac5583f4ab1d08fb9a495e4509e700e6769b77
-
Filesize
9KB
MD5aa3bcb78248ba1aaefc1af02969ff0d9
SHA1c01d97b6598b300b8237e89c3182c3e5355d9222
SHA2564cb2b0ba5f5c25dbab0cedf2a72d2356c9c7374e22b3cfb448192a1ee7b62f97
SHA512a88ea0b2abdb3e2f0a447b2616550e9745bde360cf6f365fbaf41b141ee2923656a8b27bb356c32d5773284492b084b7b3f93bd1e8ab5d3c97ab4bf40f811a00
-
Filesize
9KB
MD57aac0822c109d3d630fbbf29fc8436c7
SHA1c010621b307874f7ff73c797b26f3c57b6026915
SHA25608073f7857dd9622e30429d4e834e02cf1fb1b91a96fcf0624748c196dea0209
SHA512b51ea1b8d5e3ccfdce4f276b6370ec0318e4d0db32b3b24e8ded91392fc54f2f082c931c412e81610afdfadff03de5ed033babdf8e174cb8975bdbaf3e35be74
-
Filesize
9KB
MD53d43b389ced934b7cb7ca55b0bbf5fdc
SHA1459ecdb3c0225354a1fcca855e7a653f1dfa1e1e
SHA256589c60c76c04c25ee4a8340bcb4b7453341eecccc39444526c70be9176727a78
SHA512d6da30cc1befed1008c79c862531424581d0c2159198dc4f832e51cbac82c20f6f02e90379590c4262c0f0be4cac0ab691b736776c0c0bc0c2e8cf77a5353617
-
Filesize
205KB
MD529f72ba49124245ea7efe63b818f5ebe
SHA10ed6ec6bb598941b6b136078e38612e31b08bd66
SHA256e3d37ba5b223efdc821a974daaa354c1772b777d9d5d74164d4aecfe1a53bb9b
SHA5125f116c3bb34eabaf0f706821cbf25a3433c680ae7809ca344878817fa63097ab2718fc2a6bd5109e971c52079207146d5461b64032676e5e2c55ce034c9b1ccd
-
Filesize
205KB
MD51aa1830e590cfff4ffff8cdb1c21ac09
SHA1144c79094bd794564d19fee74fd50f2f4d8f4930
SHA25669362fc54eff4f3d04abfe8de730e29413c9eb83b20cae2cf131522a2644d7d6
SHA5121dd20272e3dd9bd516e6a28898fee26b81654033bda56cdcb7fc93e2a8079daef663837253f0688fdf9c42bd55f846d17ad83a11098e8a87fcdcf78a42087d2e
-
Filesize
46KB
MD58c356304521d4385dbfb8e9a5bc3279d
SHA1213eae248f046a9547d748ccd70c32f2b73bc045
SHA2564e2167bb9329387158d25231f52fb5ae4949d2fcd808f3663448c023b6c8d581
SHA512c7739c4ed44056ee7fc7a4bcebd7b62ada9c1309a8298af4a7f2957dcfbe0616c606ce3e6f0064fa7035e9e78907350c060a532a51022153966092e027c3ec53
-
Filesize
151B
MD511eccf60af29ff9422efb035e6a85604
SHA1ec232309864af131004443b414e3d0ead11fe755
SHA256f540050cb70db000793dbbf40815cd1420b6606ab1e33105d37d81a585f5718c
SHA512fa903ab86091762ccdc71b01b67166144bae2d8cea567c784a8df37bf6ec034844fb871af70c320889dc9760236851c4d2822146f782c3eb56f780ef085d7f21