Overview
overview
10Static
static
10Mercurial ...al.exe
windows7-x64
10Mercurial ...al.exe
windows10-2004-x64
10Mercurial ...config
windows7-x64
3Mercurial ...config
windows10-2004-x64
3Mercurial ...rs.xml
windows7-x64
3Mercurial ...rs.xml
windows10-2004-x64
1Mercurial ...ner.cs
windows7-x64
3Mercurial ...ner.cs
windows10-2004-x64
3Mercurial ...rm1.js
windows7-x64
3Mercurial ...rm1.js
windows10-2004-x64
3Mercurial ...m1.vbs
windows7-x64
1Mercurial ...m1.vbs
windows10-2004-x64
1Mercurial ...csproj
windows7-x64
3Mercurial ...csproj
windows10-2004-x64
3Mercurial ...ram.cs
windows7-x64
3Mercurial ...ram.cs
windows10-2004-x64
3Mercurial ...nfo.cs
windows7-x64
3Mercurial ...nfo.cs
windows10-2004-x64
3Mercurial ...er.vbs
windows7-x64
1Mercurial ...er.vbs
windows10-2004-x64
1Mercurial ...es.vbs
windows7-x64
1Mercurial ...es.vbs
windows10-2004-x64
1Mercurial ...ner.cs
windows7-x64
3Mercurial ...ner.cs
windows10-2004-x64
3Mercurial ...ttings
windows7-x64
3Mercurial ...ttings
windows10-2004-x64
3Mercurial ...s.licx
windows7-x64
3Mercurial ...s.licx
windows10-2004-x64
3Mercurial ...Gcm.js
windows7-x64
3Mercurial ...Gcm.js
windows10-2004-x64
3Mercurial ...ser.js
windows7-x64
3Mercurial ...ser.js
windows10-2004-x64
3Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-11-2024 11:26
Behavioral task
behavioral1
Sample
Mercurial Grabber.v1.03/Mercurial.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Mercurial Grabber.v1.03/Mercurial.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Mercurial Grabber.v1.03/Mercurial/App.config
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Mercurial Grabber.v1.03/Mercurial/App.config
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Mercurial Grabber.v1.03/Mercurial/FodyWeavers.xml
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Mercurial Grabber.v1.03/Mercurial/FodyWeavers.xml
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Mercurial Grabber.v1.03/Mercurial/Form1.Designer.cs
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Mercurial Grabber.v1.03/Mercurial/Form1.Designer.cs
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Mercurial Grabber.v1.03/Mercurial/Form1.js
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
Mercurial Grabber.v1.03/Mercurial/Form1.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Mercurial Grabber.v1.03/Mercurial/Form1.vbs
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Mercurial Grabber.v1.03/Mercurial/Form1.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Mercurial Grabber.v1.03/Mercurial/Mercurial.csproj
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
Mercurial Grabber.v1.03/Mercurial/Mercurial.csproj
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Mercurial Grabber.v1.03/Mercurial/Program.cs
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Mercurial Grabber.v1.03/Mercurial/Program.cs
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Mercurial Grabber.v1.03/Mercurial/Properties/AssemblyInfo.cs
Resource
win7-20241023-en
Behavioral task
behavioral18
Sample
Mercurial Grabber.v1.03/Mercurial/Properties/AssemblyInfo.cs
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Mercurial Grabber.v1.03/Mercurial/Properties/Resources.Designer.vbs
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
Mercurial Grabber.v1.03/Mercurial/Properties/Resources.Designer.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Mercurial Grabber.v1.03/Mercurial/Properties/Resources.vbs
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Mercurial Grabber.v1.03/Mercurial/Properties/Resources.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Mercurial Grabber.v1.03/Mercurial/Properties/Settings.Designer.cs
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
Mercurial Grabber.v1.03/Mercurial/Properties/Settings.Designer.cs
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
Mercurial Grabber.v1.03/Mercurial/Properties/Settings.settings
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
Mercurial Grabber.v1.03/Mercurial/Properties/Settings.settings
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
Mercurial Grabber.v1.03/Mercurial/Properties/licenses.licx
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
Mercurial Grabber.v1.03/Mercurial/Properties/licenses.licx
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
Mercurial Grabber.v1.03/Mercurial/Resources/AesGcm.js
Resource
win7-20241023-en
Behavioral task
behavioral30
Sample
Mercurial Grabber.v1.03/Mercurial/Resources/AesGcm.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
Mercurial Grabber.v1.03/Mercurial/Resources/Browser.js
Resource
win7-20240729-en
Behavioral task
behavioral32
Sample
Mercurial Grabber.v1.03/Mercurial/Resources/Browser.js
Resource
win10v2004-20241007-en
General
-
Target
Mercurial Grabber.v1.03/Mercurial/Program.cs
-
Size
510B
-
MD5
d8692b1ad102280d59843e358fdcc9fa
-
SHA1
4d5b44762c74ceff17323f8acd553f6af527fe79
-
SHA256
f5b656e5ecc1cf14bcc9fcac75dc48ed0b8a04f6a2e47d088eedcd6249ff1913
-
SHA512
df09655bdbe6610fd99cdc02bfdee44b46e1dc72aca245d2685e32935787da23d6ff34058161f74f059080641e5cdcd6e6f83c847f2f168ed7a9a2f725d026e2
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\.cs\ = "cs_auto_file" cmd.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\cs_auto_file cmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\cs_auto_file\ cmd.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\.cs cmd.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\cs_auto_file\shell\Read cmd.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\cs_auto_file\shell cmd.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\cs_auto_file\shell\Read\command cmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\cs_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" cmd.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2652 AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2652 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2652 AcroRd32.exe 2652 AcroRd32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2652 2088 cmd.exe 32 PID 2088 wrote to memory of 2652 2088 cmd.exe 32 PID 2088 wrote to memory of 2652 2088 cmd.exe 32 PID 2088 wrote to memory of 2652 2088 cmd.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Mercurial Grabber.v1.03\Mercurial\Program.cs"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Mercurial Grabber.v1.03\Mercurial\Program.cs"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5b7781e4d1d76db3ef51e86fbc0578ae0
SHA1849cf33ff6a60849fedacdc17177241834f90df2
SHA256c5746f97b28799109c11e01f77c1c348b7561c0a5e49a2370e0918a72828fe86
SHA5128f516b5f7089017c45a13cb034c0b6c40079af86beeb8743810524c434b60a02f2d4acd4c1a23a15aaef3c89da69323f1fedc842eb79fc0841d75e7d51ebb69c