Analysis

  • max time kernel
    91s
  • max time network
    95s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    05-10-2024 18:16

General

  • Target

    xss.exe

  • Size

    41KB

  • MD5

    8c8462f77d7da933e773217543875242

  • SHA1

    600481ffce0ec20d647a563f68ed7c42c99d79bc

  • SHA256

    7c5bdc508e740b5477871d8fbded196a6e66b240356165d516e566bdf6d8aa08

  • SHA512

    aebcf476e7fd6ae619fa483b2c33cedf7175f3da5381ad4ab2efbaafe61b3d006b7ecee6d932d93533df717cb2a4d67f03c7beba775821a145519dd9bca06dfe

  • SSDEEP

    768:UscabfwOAPfT6axpDXswguZkeEWTj7KZKfgm3EhR1:7cIkfnxEeEWTXF7Ev1

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discordapp.com/api/webhooks/932314974821416980/osLcs7_JnbCl3GNDJZN2PxdF0np-7hpN0orKxo5zZk82dncLriutJ3OKggCDNXZwDzgK

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\xss.exe
    "C:\Users\Admin\AppData\Local\Temp\xss.exe"
    1⤵
    • Looks for VirtualBox Guest Additions in registry
    • Looks for VMWare Tools registry key
    • Checks BIOS information in registry
    • Maps connected drives based on registry
    • Checks SCSI registry key(s)
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious use of AdjustPrivilegeToken
    PID:2172
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4172

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2172-0-0x00007FF80A8D3000-0x00007FF80A8D5000-memory.dmp

      Filesize

      8KB

    • memory/2172-1-0x0000000000D30000-0x0000000000D40000-memory.dmp

      Filesize

      64KB

    • memory/2172-2-0x00007FF80A8D0000-0x00007FF80B392000-memory.dmp

      Filesize

      10.8MB

    • memory/2172-3-0x00007FF80A8D3000-0x00007FF80A8D5000-memory.dmp

      Filesize

      8KB

    • memory/2172-4-0x00007FF80A8D0000-0x00007FF80B392000-memory.dmp

      Filesize

      10.8MB

    • memory/2172-8-0x00007FF80A8D0000-0x00007FF80B392000-memory.dmp

      Filesize

      10.8MB