Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22-09-2024 12:10
Behavioral task
behavioral1
Sample
Urm.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Urm.exe
Resource
win10v2004-20240802-en
General
-
Target
Urm.exe
-
Size
41KB
-
MD5
83f52e0aebc4f6f8bafbfa855e826dcc
-
SHA1
37b64811517ee85fc8d3f64f67ddd1ee7372f811
-
SHA256
99c7c262aa5b81a8694ae3e6449972f84edc48165f17e59e7d56bd6b2c9875e6
-
SHA512
00dbdee6de08cae2e96ec758a6ac9075a52ce4c8f8149dfdd8afb2963835ebac883747fcadcd6f77c4737cfa827bfddf1de87dbbeca738d0f7c24476f1297d6e
-
SSDEEP
768:rN8C37hX/XSNluZVLrpTjeKZKfgm3Ehq3:6LyLrpTqF7E43
Malware Config
Signatures
-
Mercurial Grabber Stealer
Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip4.seeip.org 8 ip-api.com -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Urm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Urm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2468 Urm.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2468 wrote to memory of 2604 2468 Urm.exe 33 PID 2468 wrote to memory of 2604 2468 Urm.exe 33 PID 2468 wrote to memory of 2604 2468 Urm.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\Urm.exe"C:\Users\Admin\AppData\Local\Temp\Urm.exe"1⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2468 -s 13282⤵PID:2604
-