Analysis

  • max time kernel
    122s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-11-2024 11:26

General

  • Target

    Mercurial Grabber.v1.03/Mercurial/Form1.Designer.cs

  • Size

    202KB

  • MD5

    b2764313a63b490b214eb1483ae7a718

  • SHA1

    d76116495cf308421cda8e2f513eb42d8c86929c

  • SHA256

    d45b464533291a92791f6d60d6cf35186c35a0dbfda941bfbd4348ef7c0a5db3

  • SHA512

    03c7237e8a1c72f3882f88d7919e224779a37387ca4a2f59e8670817facddd0be3489ed9b5f7f113365bfcc683fec940438130913db458c52ddcaeec6c5ba91b

  • SSDEEP

    768:7D4yTHd2l2LdNw5U1QfPvPKCtAzfiDNTYZKc5G5li6dhl/J57ABrEYL5U1JXCPMs:PHsDvPOZKc5G5li6HpUA5m

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Mercurial Grabber.v1.03\Mercurial\Form1.Designer.cs"
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1240
    • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
      "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Mercurial Grabber.v1.03\Mercurial\Form1.Designer.cs"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2436

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    7a3175437077b6a3b2c6d1f77cf667d4

    SHA1

    86bc4962cc97d28944b25c7187a3f3c0c9c2dff0

    SHA256

    53a20e77c3a0f020fda085a65bce2bc2e45e996cd52d88e8d0316594d84ac905

    SHA512

    17fa410fb345dd2ac3b46c904740969984c804de14d40c2fab45c2c9c7b1cc3ca6301f1d1d9071f64fc98140d7d5c0d56cc8134abca12ee1b4e99b75951f7dbc