Analysis
-
max time kernel
9s -
max time network
8s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-09-2024 09:31
Behavioral task
behavioral1
Sample
Urm.exe
Resource
win10v2004-20240802-en
7 signatures
150 seconds
General
-
Target
Urm.exe
-
Size
41KB
-
MD5
83f52e0aebc4f6f8bafbfa855e826dcc
-
SHA1
37b64811517ee85fc8d3f64f67ddd1ee7372f811
-
SHA256
99c7c262aa5b81a8694ae3e6449972f84edc48165f17e59e7d56bd6b2c9875e6
-
SHA512
00dbdee6de08cae2e96ec758a6ac9075a52ce4c8f8149dfdd8afb2963835ebac883747fcadcd6f77c4737cfa827bfddf1de87dbbeca738d0f7c24476f1297d6e
-
SSDEEP
768:rN8C37hX/XSNluZVLrpTjeKZKfgm3Ehq3:6LyLrpTqF7E43
Score
10/10
Malware Config
Signatures
-
Mercurial Grabber Stealer
Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip4.seeip.org -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 4076 taskmgr.exe 4076 taskmgr.exe 4076 taskmgr.exe 4076 taskmgr.exe 4076 taskmgr.exe 4076 taskmgr.exe 4076 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4540 Urm.exe Token: SeDebugPrivilege 4076 taskmgr.exe Token: SeSystemProfilePrivilege 4076 taskmgr.exe Token: SeCreateGlobalPrivilege 4076 taskmgr.exe -
Suspicious use of FindShellTrayWindow 19 IoCs
pid Process 4076 taskmgr.exe 4076 taskmgr.exe 4076 taskmgr.exe 4076 taskmgr.exe 4076 taskmgr.exe 4076 taskmgr.exe 4076 taskmgr.exe 4076 taskmgr.exe 4076 taskmgr.exe 4076 taskmgr.exe 4076 taskmgr.exe 4076 taskmgr.exe 4076 taskmgr.exe 4076 taskmgr.exe 4076 taskmgr.exe 4076 taskmgr.exe 4076 taskmgr.exe 4076 taskmgr.exe 4076 taskmgr.exe -
Suspicious use of SendNotifyMessage 19 IoCs
pid Process 4076 taskmgr.exe 4076 taskmgr.exe 4076 taskmgr.exe 4076 taskmgr.exe 4076 taskmgr.exe 4076 taskmgr.exe 4076 taskmgr.exe 4076 taskmgr.exe 4076 taskmgr.exe 4076 taskmgr.exe 4076 taskmgr.exe 4076 taskmgr.exe 4076 taskmgr.exe 4076 taskmgr.exe 4076 taskmgr.exe 4076 taskmgr.exe 4076 taskmgr.exe 4076 taskmgr.exe 4076 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Urm.exe"C:\Users\Admin\AppData\Local\Temp\Urm.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4540
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4076