Analysis

  • max time kernel
    147s
  • max time network
    278s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-de
  • resource tags

    arch:x64arch:x86image:win11-20241007-delocale:de-deos:windows11-21h2-x64systemwindows
  • submitted
    19-11-2024 11:23

General

  • Target

    Mercurial Grabber.v1.03/Mercurial/FodyWeavers.xml

  • Size

    139B

  • MD5

    d43cae162166535ffb77fe23ba9939b3

  • SHA1

    a90ee3518fcb92bc6fdf16a699b141f22b9b7946

  • SHA256

    4448546786231d0d396a9987bc8776509a7a6f6fd755fc68ce63bed29ca8ee33

  • SHA512

    30c836160cb51cb162391cc8172e620564d8529bbf618c930a0de4b037f977f03a9a3950cc3546194c5d452435aeb2fcbc416a8c5206b05710c1b11168d51e2a

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 29 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Mercurial Grabber.v1.03\Mercurial\FodyWeavers.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:340
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Mercurial Grabber.v1.03\Mercurial\FodyWeavers.xml
      2⤵
      • Modifies Internet Explorer settings
      PID:464

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/340-0-0x00007FF909B70000-0x00007FF909B80000-memory.dmp

    Filesize

    64KB

  • memory/340-4-0x00007FF909B70000-0x00007FF909B80000-memory.dmp

    Filesize

    64KB

  • memory/340-2-0x00007FF909B70000-0x00007FF909B80000-memory.dmp

    Filesize

    64KB

  • memory/340-1-0x00007FF909B70000-0x00007FF909B80000-memory.dmp

    Filesize

    64KB

  • memory/340-3-0x00007FF949B83000-0x00007FF949B84000-memory.dmp

    Filesize

    4KB

  • memory/340-5-0x00007FF949AE0000-0x00007FF949CE9000-memory.dmp

    Filesize

    2.0MB

  • memory/340-8-0x00007FF949AE0000-0x00007FF949CE9000-memory.dmp

    Filesize

    2.0MB

  • memory/340-9-0x00007FF949AE0000-0x00007FF949CE9000-memory.dmp

    Filesize

    2.0MB

  • memory/340-7-0x00007FF909B70000-0x00007FF909B80000-memory.dmp

    Filesize

    64KB

  • memory/340-10-0x00007FF949AE0000-0x00007FF949CE9000-memory.dmp

    Filesize

    2.0MB

  • memory/340-6-0x00007FF949AE0000-0x00007FF949CE9000-memory.dmp

    Filesize

    2.0MB

  • memory/340-12-0x00007FF949AE0000-0x00007FF949CE9000-memory.dmp

    Filesize

    2.0MB

  • memory/340-11-0x00007FF949AE0000-0x00007FF949CE9000-memory.dmp

    Filesize

    2.0MB

  • memory/340-14-0x00007FF949AE0000-0x00007FF949CE9000-memory.dmp

    Filesize

    2.0MB

  • memory/340-17-0x00007FF949AE0000-0x00007FF949CE9000-memory.dmp

    Filesize

    2.0MB

  • memory/340-16-0x00007FF949AE0000-0x00007FF949CE9000-memory.dmp

    Filesize

    2.0MB

  • memory/340-15-0x00007FF949AE0000-0x00007FF949CE9000-memory.dmp

    Filesize

    2.0MB

  • memory/340-13-0x00007FF949AE0000-0x00007FF949CE9000-memory.dmp

    Filesize

    2.0MB

  • memory/340-19-0x00007FF909B70000-0x00007FF909B80000-memory.dmp

    Filesize

    64KB

  • memory/340-23-0x00007FF949AE0000-0x00007FF949CE9000-memory.dmp

    Filesize

    2.0MB

  • memory/340-22-0x00007FF949AE0000-0x00007FF949CE9000-memory.dmp

    Filesize

    2.0MB

  • memory/340-21-0x00007FF909B70000-0x00007FF909B80000-memory.dmp

    Filesize

    64KB

  • memory/340-20-0x00007FF909B70000-0x00007FF909B80000-memory.dmp

    Filesize

    64KB

  • memory/340-18-0x00007FF909B70000-0x00007FF909B80000-memory.dmp

    Filesize

    64KB