Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-10-2024 00:22
Behavioral task
behavioral1
Sample
7d4024c808e3260b6758e2ccbbbf39a1_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7d4024c808e3260b6758e2ccbbbf39a1_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
7d4024c808e3260b6758e2ccbbbf39a1_JaffaCakes118.exe
-
Size
42KB
-
MD5
7d4024c808e3260b6758e2ccbbbf39a1
-
SHA1
cfdf9e2f7906c2bb545a2ed31ec99cc56110268c
-
SHA256
3f3ba0a078fe46dad2725317af4356eca4840380ac34d34c32f2709b9d56e541
-
SHA512
0887794a3e6333bad228ecab2e1324110b56038efe9c6cf4ffed8b260e7c015c19ba166aeac164e6d340906c4b98043f55fb0b9cabd3b1f0db44b298a261156a
-
SSDEEP
384:zx65RYv2J4hIIFt5raNRWgxfYTx3s/XZxIh/YoJEFq5nm9BTAsbKQsLd/SfgUfA6:we9xCRWfRuZqLYBTjbKZKfgm3Ehmp
Malware Config
Extracted
mercurialgrabber
https://discord.com/api/webhooks/854748062370103318/s6gChj_BDPlpnf9aZuoxHbunaWMu4111E-5Br1rr_A19cJENTEiyVR6LD0FKWOp4WqzD
Signatures
-
Mercurial Grabber Stealer
Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.
-
Mercurialgrabber family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 ip4.seeip.org 8 ip-api.com -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
7d4024c808e3260b6758e2ccbbbf39a1_JaffaCakes118.exedescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 7d4024c808e3260b6758e2ccbbbf39a1_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 7d4024c808e3260b6758e2ccbbbf39a1_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
7d4024c808e3260b6758e2ccbbbf39a1_JaffaCakes118.exedescription pid Process Token: SeDebugPrivilege 2296 7d4024c808e3260b6758e2ccbbbf39a1_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
7d4024c808e3260b6758e2ccbbbf39a1_JaffaCakes118.exedescription pid Process procid_target PID 2296 wrote to memory of 2620 2296 7d4024c808e3260b6758e2ccbbbf39a1_JaffaCakes118.exe 33 PID 2296 wrote to memory of 2620 2296 7d4024c808e3260b6758e2ccbbbf39a1_JaffaCakes118.exe 33 PID 2296 wrote to memory of 2620 2296 7d4024c808e3260b6758e2ccbbbf39a1_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d4024c808e3260b6758e2ccbbbf39a1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7d4024c808e3260b6758e2ccbbbf39a1_JaffaCakes118.exe"1⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2296 -s 13962⤵PID:2620
-