Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 23:26
Static task
static1
Behavioral task
behavioral1
Sample
d5481b1558c02cc5b27eea52074e0d08_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d5481b1558c02cc5b27eea52074e0d08_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d5481b1558c02cc5b27eea52074e0d08_JaffaCakes118.exe
-
Size
58KB
-
MD5
d5481b1558c02cc5b27eea52074e0d08
-
SHA1
a1eff2bf50c1323a8beb7b0e60f39e14a81b224d
-
SHA256
f54dd71bb0feb30a19123b93cc9ce60b3d6e603b9b5967c472b8cc35d9618c12
-
SHA512
4aa8cb795cc3d3fce1905ef7e3ea6f497e9c5be9e4fce188aa385b31b003ae1f403cf84bd14385f86149f47551b68ef2668b322bd39197b978fe60df6b3828ec
-
SSDEEP
1536:kk/MJnS3kgqrYMLDdAg7w9fQ65aXPrB72nkW:/kJnS0gQX5J7w9fjafrBykW
Malware Config
Extracted
mercurialgrabber
https://discord.com/api/webhooks/888502856733294672/TOj_bSh6Zkm2K7SzTPO616Cabe61-suc7UYdT52jA3Da2mmB2WhCEsY9-w2h5G8rjsRY
Signatures
-
Mercurial Grabber Stealer
Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 ip4.seeip.org 8 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
Processes:
d5481b1558c02cc5b27eea52074e0d08_JaffaCakes118.exedescription pid process target process PID 1884 set thread context of 2916 1884 d5481b1558c02cc5b27eea52074e0d08_JaffaCakes118.exe RegAsm.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2500 2916 WerFault.exe RegAsm.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
d5481b1558c02cc5b27eea52074e0d08_JaffaCakes118.exeRegAsm.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d5481b1558c02cc5b27eea52074e0d08_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
RegAsm.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
RegAsm.exedescription pid process Token: SeDebugPrivilege 2916 RegAsm.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
d5481b1558c02cc5b27eea52074e0d08_JaffaCakes118.exeRegAsm.exedescription pid process target process PID 1884 wrote to memory of 2916 1884 d5481b1558c02cc5b27eea52074e0d08_JaffaCakes118.exe RegAsm.exe PID 1884 wrote to memory of 2916 1884 d5481b1558c02cc5b27eea52074e0d08_JaffaCakes118.exe RegAsm.exe PID 1884 wrote to memory of 2916 1884 d5481b1558c02cc5b27eea52074e0d08_JaffaCakes118.exe RegAsm.exe PID 1884 wrote to memory of 2916 1884 d5481b1558c02cc5b27eea52074e0d08_JaffaCakes118.exe RegAsm.exe PID 1884 wrote to memory of 2916 1884 d5481b1558c02cc5b27eea52074e0d08_JaffaCakes118.exe RegAsm.exe PID 1884 wrote to memory of 2916 1884 d5481b1558c02cc5b27eea52074e0d08_JaffaCakes118.exe RegAsm.exe PID 1884 wrote to memory of 2916 1884 d5481b1558c02cc5b27eea52074e0d08_JaffaCakes118.exe RegAsm.exe PID 1884 wrote to memory of 2916 1884 d5481b1558c02cc5b27eea52074e0d08_JaffaCakes118.exe RegAsm.exe PID 1884 wrote to memory of 2916 1884 d5481b1558c02cc5b27eea52074e0d08_JaffaCakes118.exe RegAsm.exe PID 1884 wrote to memory of 2916 1884 d5481b1558c02cc5b27eea52074e0d08_JaffaCakes118.exe RegAsm.exe PID 1884 wrote to memory of 2916 1884 d5481b1558c02cc5b27eea52074e0d08_JaffaCakes118.exe RegAsm.exe PID 1884 wrote to memory of 2916 1884 d5481b1558c02cc5b27eea52074e0d08_JaffaCakes118.exe RegAsm.exe PID 2916 wrote to memory of 2500 2916 RegAsm.exe WerFault.exe PID 2916 wrote to memory of 2500 2916 RegAsm.exe WerFault.exe PID 2916 wrote to memory of 2500 2916 RegAsm.exe WerFault.exe PID 2916 wrote to memory of 2500 2916 RegAsm.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5481b1558c02cc5b27eea52074e0d08_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d5481b1558c02cc5b27eea52074e0d08_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2916 -s 14243⤵
- Program crash
PID:2500
-
-