Resubmissions

26-09-2024 09:59

240926-lz6wbszhqj 10

Analysis

  • max time kernel
    26s
  • max time network
    32s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-09-2024 09:59

General

  • Target

    https://github.com/draven-office/discord-old-account-genrator

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/917748860682657832/sSsKt4ikHoi9zkepKqNjrrQK503_MnWsxInF6XnFlC2W3mmbZI320rx6s-R3dnG3i8W3

Signatures

  • Mercurial Grabber Stealer

    Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

  • Looks for VirtualBox Guest Additions in registry 2 TTPs 2 IoCs
  • Looks for VMWare Tools registry key 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Maps connected drives based on registry 3 TTPs 4 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 2 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 11 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 11 IoCs
  • Modifies registry class 3 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 21 IoCs
  • Suspicious use of SendNotifyMessage 20 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Program Files\Mozilla Firefox\firefox.exe
    "C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url "https://github.com/draven-office/discord-old-account-genrator"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:724
    • C:\Program Files\Mozilla Firefox\firefox.exe
      "C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url https://github.com/draven-office/discord-old-account-genrator
      2⤵
      • Checks processor information in registry
      • Modifies registry class
      • NTFS ADS
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4292
      • C:\Program Files\Mozilla Firefox\firefox.exe
        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2028 -parentBuildID 20240401114208 -prefsHandle 1940 -prefMapHandle 1932 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7001334a-ea4c-49de-9d39-18c5595a4dd8} 4292 "\\.\pipe\gecko-crash-server-pipe.4292" gpu
        3⤵
          PID:2660
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2444 -prefMapHandle 2440 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {29a519fe-e7a8-44c0-afef-e7c33b6071c7} 4292 "\\.\pipe\gecko-crash-server-pipe.4292" socket
          3⤵
            PID:1980
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3128 -childID 1 -isForBrowser -prefsHandle 3288 -prefMapHandle 3296 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b74e7635-ae62-45ae-8fe7-0f3c559bd173} 4292 "\\.\pipe\gecko-crash-server-pipe.4292" tab
            3⤵
              PID:1036
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2776 -childID 2 -isForBrowser -prefsHandle 3624 -prefMapHandle 3612 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {59388807-2b49-4e8f-8cf2-2e375302499a} 4292 "\\.\pipe\gecko-crash-server-pipe.4292" tab
              3⤵
                PID:1424
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4172 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4200 -prefMapHandle 4196 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {86414a24-2de0-4ea3-b4b0-9cbea77ed08a} 4292 "\\.\pipe\gecko-crash-server-pipe.4292" utility
                3⤵
                • Checks processor information in registry
                PID:2880
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5408 -childID 3 -isForBrowser -prefsHandle 5428 -prefMapHandle 5424 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d1ecc217-b4be-43a1-bd50-59a2fbcd25e6} 4292 "\\.\pipe\gecko-crash-server-pipe.4292" tab
                3⤵
                  PID:956
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5556 -childID 4 -isForBrowser -prefsHandle 5564 -prefMapHandle 5568 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a836067e-79fe-48e2-93e1-a5cce5a58e90} 4292 "\\.\pipe\gecko-crash-server-pipe.4292" tab
                  3⤵
                    PID:3308
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5772 -childID 5 -isForBrowser -prefsHandle 5848 -prefMapHandle 5844 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c8835e1b-48d2-451b-9bab-38430cf18201} 4292 "\\.\pipe\gecko-crash-server-pipe.4292" tab
                    3⤵
                      PID:4580
                • C:\Windows\System32\rundll32.exe
                  C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                  1⤵
                    PID:3200
                  • C:\Users\Admin\Desktop\discord-old-account-genrator-main\discord old account genrator.exe
                    "C:\Users\Admin\Desktop\discord-old-account-genrator-main\discord old account genrator.exe"
                    1⤵
                    • Adds Run key to start application
                    • System Location Discovery: System Language Discovery
                    • Modifies registry class
                    PID:2612
                    • C:\Users\Admin\Desktop\discord-old-account-genrator-main\._cache_discord old account genrator.exe
                      "C:\Users\Admin\Desktop\discord-old-account-genrator-main\._cache_discord old account genrator.exe"
                      2⤵
                      • Looks for VirtualBox Guest Additions in registry
                      • Looks for VMWare Tools registry key
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Maps connected drives based on registry
                      • Checks SCSI registry key(s)
                      • Enumerates system info in registry
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3516
                    • C:\ProgramData\Synaptics\Synaptics.exe
                      "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
                      2⤵
                      • Checks computer location settings
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      • Modifies registry class
                      PID:1412
                      • C:\Users\Admin\Desktop\discord-old-account-genrator-main\._cache_Synaptics.exe
                        "C:\Users\Admin\Desktop\discord-old-account-genrator-main\._cache_Synaptics.exe" InjUpdate
                        3⤵
                        • Looks for VirtualBox Guest Additions in registry
                        • Looks for VMWare Tools registry key
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Maps connected drives based on registry
                        • Checks SCSI registry key(s)
                        • Enumerates system info in registry
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3732
                  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
                    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
                    1⤵
                    • Checks processor information in registry
                    • Enumerates system info in registry
                    • Suspicious behavior: AddClipboardFormatListener
                    • Suspicious use of SetWindowsHookEx
                    PID:3720
                  • C:\Users\Admin\Desktop\discord-old-account-genrator-main\discord old account genrator.exe
                    "C:\Users\Admin\Desktop\discord-old-account-genrator-main\discord old account genrator.exe"
                    1⤵
                      PID:5320
                      • C:\Users\Admin\Desktop\discord-old-account-genrator-main\._cache_discord old account genrator.exe
                        "C:\Users\Admin\Desktop\discord-old-account-genrator-main\._cache_discord old account genrator.exe"
                        2⤵
                          PID:5548
                      • C:\Users\Admin\Desktop\discord-old-account-genrator-main\discord old account genrator.exe
                        "C:\Users\Admin\Desktop\discord-old-account-genrator-main\discord old account genrator.exe"
                        1⤵
                          PID:5744
                          • C:\Users\Admin\Desktop\discord-old-account-genrator-main\._cache_discord old account genrator.exe
                            "C:\Users\Admin\Desktop\discord-old-account-genrator-main\._cache_discord old account genrator.exe"
                            2⤵
                              PID:5820
                          • C:\Users\Admin\Desktop\discord-old-account-genrator-main\discord old account genrator.exe
                            "C:\Users\Admin\Desktop\discord-old-account-genrator-main\discord old account genrator.exe"
                            1⤵
                              PID:5960
                              • C:\Users\Admin\Desktop\discord-old-account-genrator-main\._cache_discord old account genrator.exe
                                "C:\Users\Admin\Desktop\discord-old-account-genrator-main\._cache_discord old account genrator.exe"
                                2⤵
                                  PID:6020

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\ProgramData\Synaptics\Synaptics.exe

                                Filesize

                                814KB

                                MD5

                                a7885d5a280d874597fa46ce44150902

                                SHA1

                                f9e5676fffb7ed9712edea377001f8afe873fcbd

                                SHA256

                                8687c478dfa4c98ff859800174c5d53f8fb7d57669e520d7b94c7898bbddd2e9

                                SHA512

                                3032a182c8579d370d7b05b264d7b583096278ae20ac9c9c81fbc87e3309a931f56d9601464ffac5ee85d20e4c117e76540c5ba076580cfd6cd2d238a6fc776d

                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\illkw0pr.default-release\activity-stream.discovery_stream.json

                                Filesize

                                28KB

                                MD5

                                fd7cc082d4072cb694a6de5a1a350fb1

                                SHA1

                                1ff64fcf1b6e08dbb2a23c9f299264f8a43b1c1f

                                SHA256

                                a393214faf912abd2760bb22a03151b78984fba717ad4220fa68efd23d5f5e95

                                SHA512

                                83659ea144be3299a17d9f045d5968f2e22e520e563e3b6995ee13c8a2175e2bb3ea69d8f84ce6443c3b9f040ad56ab595a27819e079016e3f3b1ea06e450ee5

                              • C:\Users\Admin\AppData\Local\Temp\83D75E00

                                Filesize

                                21KB

                                MD5

                                0f2b414d4851020c855f402891006c45

                                SHA1

                                dc1701a5651e9c1a9d96b79470d5b7e9e0194f2c

                                SHA256

                                b8f0dc5a1887da0bd54cb4cf60a136af4d2c252c92928dd843982a0087f57d4f

                                SHA512

                                e6bdadc966371dd21cc1e90378ec46041afb82547e8de7c692650cdedfce900f07ca236ec4d8c15dcf6bf6b828f75ce51d87c5f7d39560462665851583b21751

                              • C:\Users\Admin\AppData\Local\Temp\fNE417GG.xlsm

                                Filesize

                                17KB

                                MD5

                                e566fc53051035e1e6fd0ed1823de0f9

                                SHA1

                                00bc96c48b98676ecd67e81a6f1d7754e4156044

                                SHA256

                                8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

                                SHA512

                                a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\illkw0pr.default-release\AlternateServices.bin

                                Filesize

                                6KB

                                MD5

                                1fe63de8ca06f665263b748f2164ae03

                                SHA1

                                5dfc6c4655a210cb388a5c0ea7c46ae297a35481

                                SHA256

                                dc4bee49d8f0d26758dc46b81509fcd34289a052902176cef55b480f11bff37e

                                SHA512

                                cabf44291565404a2c2b44083bcb35fc0610a9527dc86448e54b6fd02d1d4fbd3bbf04225ad3a1f4dc36a2ec904aaca7a6a0b062bb2fe51d16306f6880f1483c

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\illkw0pr.default-release\datareporting\glean\db\data.safe.tmp

                                Filesize

                                5KB

                                MD5

                                06cbbcfc8e979b4032b646ed347e9eb6

                                SHA1

                                51de9ee233e52cdb6d56c56f4b9ef7cd8566a950

                                SHA256

                                6336263ef4fc3ce98d7235bf2c56a74be53b4a811796b185e84f04da2aa608e0

                                SHA512

                                93866d9ef79f79d6041fc8b4e95e2736cf26b1f4d5b58db182e1da1e0cb9bc950ffd4b4376a64695e236b40911c48578683f6aac7ffcb9a2bd075d79140c4056

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\illkw0pr.default-release\datareporting\glean\db\data.safe.tmp

                                Filesize

                                5KB

                                MD5

                                b30d74161993800f8f00e9b870eb37c5

                                SHA1

                                6d5ae22e7db1c97e66ab5dac311c3ed9e3f8de4c

                                SHA256

                                3284923752967300404ffb1279b303e314bed8bc0ed32e0c6e3be4e4b0c8b8f2

                                SHA512

                                757ebb98b04125d82530307899cf9d2416bd1cd235f49b0d773efc10255873f9851a69810b79dd1f39bbeb52a46f67386648b4de4a8c286dc9c720bf1964592c

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\illkw0pr.default-release\datareporting\glean\pending_pings\5372130d-f9e9-4c5f-adb6-179fa9eea4f1

                                Filesize

                                982B

                                MD5

                                ec041fcc2e99ca8b2381b25100e16ea1

                                SHA1

                                7ee96196afb701ad8d8c70ebcb8ee848026178fe

                                SHA256

                                52adf206150b68c3b355cc43be797c35737658d784a3cb5d0f8c34c91bfaafd8

                                SHA512

                                8d3703a46a7f96c2a0a05e7b0524c9b7c19bb57f130ab8cbd084baf16f85d8f6be0d2413745e86eb5895cd5c2a2f636d41db92a2fa9c7a091fd65e0b0d5d1cef

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\illkw0pr.default-release\datareporting\glean\pending_pings\6c9db102-78e8-450a-bab0-7bd998bf2b35

                                Filesize

                                25KB

                                MD5

                                9e79c3bf3e89d9d56cfaffed62ee5e39

                                SHA1

                                5efd93240888e5ad389abee2bc0b8b9f1366719e

                                SHA256

                                ab4634d791c9bb28572e7c1071b19c74283521e7585d292a9183c598837f7223

                                SHA512

                                ab57090ebcc6911d743f60cc142385a5cc3d89ceecfd08df90dd2f57b5b34f68df8f5997288ccce065f34b97847b7442ecc17e237bb2deafac6ba5a5a40ab8c7

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\illkw0pr.default-release\datareporting\glean\pending_pings\89a70710-a9cc-45b5-bb36-17a79d501473

                                Filesize

                                671B

                                MD5

                                06fbccd145dbcbc0306a8564969a4d22

                                SHA1

                                9c3ce906100bcc6927aa2941e906994e4ecda419

                                SHA256

                                23d7f5d22b245d9c9d3d497705b6f09458207349c83b479d4ef9a5a9e3a24120

                                SHA512

                                c2a994acca859ba5d5dd3417c5f2ec204c1d4e285437d119270d3f56448c8b6f948800f6ac453cc11d77290ada194e8f518d9bc131644837d25c17ac4f82163d

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\illkw0pr.default-release\prefs.js

                                Filesize

                                11KB

                                MD5

                                35e27ad9d8dfa14a72b556fadf27fc44

                                SHA1

                                083de43eb38f6f05a07f1f604876a19567d4ee18

                                SHA256

                                6b74c05a6f9b5b16af1537e39316ed7d16d75bed60807e9d97202165852b2c2d

                                SHA512

                                507a4d33615d22f00fee8eb78ef208690a6e1457380ca44cb244d8745fcd4c7cd60b2f8e0d29a88c325830aead62207b92e6c7fc02b8e51ec533e9739c43cd95

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\illkw0pr.default-release\prefs.js

                                Filesize

                                11KB

                                MD5

                                c29d43be0394ba0dc7381424bd6479a4

                                SHA1

                                c8438ba3721f0562ca79b6b9570e0e661bf8be8f

                                SHA256

                                155ac69c9e95f336bf97373c5ae343dd34e75ffafab485ca4a5623fd27ddee67

                                SHA512

                                4af31aa8c75e0655a2e691c6b1e288448ad5d6c2a7d98accb1ac8f5178d468bc34c6648b57c4f71d7c98540cf13f0edc7a1ca46780d561345a616fa0e9110bb4

                              • C:\Users\Admin\Desktop\discord-old-account-genrator-main\._cache_discord old account genrator.exe

                                Filesize

                                61KB

                                MD5

                                43c467f6fd42d77d1c27b2b2eded962c

                                SHA1

                                321f7ea7ebe2e232aad0d108c24d7f462fef2b70

                                SHA256

                                cc2f9757e42d736363e5d85c68359af2db73721e800e9775b79a6082ad40fe95

                                SHA512

                                175b7849121359084883775bb83360eda0feca86cabc84875bfe01892f43679396a29d4575d54449730d6c8815f0a032f9d4a99f1829cd84dcebc482537e015d

                              • C:\Users\Admin\Downloads\discord-old-account-genrator-main.Xkwh-Veo.zip.part

                                Filesize

                                410KB

                                MD5

                                21cf7789abdcbff04229aa2d0469bfed

                                SHA1

                                8532148e576f617b843df821eab5a75ab7c314e1

                                SHA256

                                c8e03e7b6d28aae5a1cea068149bd665a65e0556b266bfe00e199f221f703b6e

                                SHA512

                                6723ff2df5eb7c2bd7ba50f9b4e87f207497be1e756b483f437ed8322f88a3a52133b6109e568f5eb7451895d1b7cf1363da7ea8e56d3db0f652f335472da6e1

                              • memory/2612-630-0x0000000000400000-0x00000000004D2000-memory.dmp

                                Filesize

                                840KB

                              • memory/2612-502-0x00000000006D0000-0x00000000006D1000-memory.dmp

                                Filesize

                                4KB

                              • memory/3516-629-0x00007FFEBF183000-0x00007FFEBF185000-memory.dmp

                                Filesize

                                8KB

                              • memory/3516-631-0x0000000000710000-0x0000000000724000-memory.dmp

                                Filesize

                                80KB

                              • memory/3720-698-0x00007FFE9F2E0000-0x00007FFE9F2F0000-memory.dmp

                                Filesize

                                64KB

                              • memory/3720-694-0x00007FFEA1B90000-0x00007FFEA1BA0000-memory.dmp

                                Filesize

                                64KB

                              • memory/3720-693-0x00007FFEA1B90000-0x00007FFEA1BA0000-memory.dmp

                                Filesize

                                64KB

                              • memory/3720-697-0x00007FFEA1B90000-0x00007FFEA1BA0000-memory.dmp

                                Filesize

                                64KB

                              • memory/3720-699-0x00007FFE9F2E0000-0x00007FFE9F2F0000-memory.dmp

                                Filesize

                                64KB

                              • memory/3720-696-0x00007FFEA1B90000-0x00007FFEA1BA0000-memory.dmp

                                Filesize

                                64KB

                              • memory/3720-695-0x00007FFEA1B90000-0x00007FFEA1BA0000-memory.dmp

                                Filesize

                                64KB

                              • memory/5320-730-0x0000000000400000-0x00000000004D2000-memory.dmp

                                Filesize

                                840KB

                              • memory/5744-753-0x0000000000400000-0x00000000004D2000-memory.dmp

                                Filesize

                                840KB

                              • memory/5960-757-0x0000000000400000-0x00000000004D2000-memory.dmp

                                Filesize

                                840KB