Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-11-2024 11:26

General

  • Target

    Mercurial Grabber.v1.03/Mercurial/App.config

  • Size

    184B

  • MD5

    cc46a0995713ba7cb577b4bbbedf83e8

  • SHA1

    6cc50a0e444e33f65d42423195ed045a3a55daf8

  • SHA256

    5fe1ad802f68d7c47dbbd8e60162ba88abaed162da5d381c85d3e4935311962e

  • SHA512

    36f5b3acbc520504cfe56e5fe19de2a22ae3d2ddddb4c0eb3e441f884033077fb411e69976c3e250c3ef01189d0e48016bde67a73a0dbc950dd5d8ec7783fd2a

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Mercurial Grabber.v1.03\Mercurial\App.config"
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2112
    • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
      "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Mercurial Grabber.v1.03\Mercurial\App.config"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    c0eebf8d1b2be88f9e59cfc835b6f7c2

    SHA1

    a5e177a0be68bcd74015b60a1492bdf8add2df18

    SHA256

    d6705b17c9e58c5457f6c9835c61a1ed7861b4e6c23875a2017d31824fc62a5a

    SHA512

    418aafcb94a519ee865f22326c4e99b27cb7ce7e27323e2a41dfa177faae34256bf6d2d23e2a58bee7ba50b3091cd87bc7d29b1b39fe07af366e548905543f7c