Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 07:50
Static task
static1
Behavioral task
behavioral1
Sample
198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe
Resource
win10v2004-20241007-en
General
-
Target
198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe
-
Size
614KB
-
MD5
23474ff9c46beb5767e6a9f0ec16af97
-
SHA1
3fdfb628a550edffdc4f9b342548e93132c39c57
-
SHA256
198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d
-
SHA512
359a099ab1bc7bee080efe90fd1aa9ff5f83b1ec6b99fad9f903e4dd06ff8b84bc9a49babb789aa52a4b44aad9e16e0662b7fb833f21621af03f9ee8c387e7b2
-
SSDEEP
12288:SQ6KyVtP9jocOXj4i6c4yplkM943ctZkmz4Ag/+LJPPzI:1yVtVEcOEi665zI
Malware Config
Signatures
-
Mercurial Grabber Stealer
Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.
-
Mercurialgrabber family
-
pid Process 2808 arp.exe 2720 arp.exe 2912 arp.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 3020 198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe 3020 198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe 3020 198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe 3020 198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe 3020 198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe 3020 198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe 3020 198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe 3020 198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe 3020 198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe 3020 198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe 3020 198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe 3020 198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe 3020 198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe 3020 198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe 3020 198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3020 198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2808 3020 198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe 31 PID 3020 wrote to memory of 2808 3020 198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe 31 PID 3020 wrote to memory of 2808 3020 198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe 31 PID 3020 wrote to memory of 2808 3020 198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe 31 PID 3020 wrote to memory of 2720 3020 198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe 32 PID 3020 wrote to memory of 2720 3020 198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe 32 PID 3020 wrote to memory of 2720 3020 198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe 32 PID 3020 wrote to memory of 2720 3020 198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe 32 PID 3020 wrote to memory of 2912 3020 198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe 33 PID 3020 wrote to memory of 2912 3020 198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe 33 PID 3020 wrote to memory of 2912 3020 198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe 33 PID 3020 wrote to memory of 2912 3020 198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe"C:\Users\Admin\AppData\Local\Temp\198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\arp.exe"C:\Windows\System32\arp.exe" -a2⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2808
-
-
C:\Windows\SysWOW64\arp.exe"C:\Windows\System32\arp.exe" -a2⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2720
-
-
C:\Windows\SysWOW64\arp.exe"C:\Windows\System32\arp.exe" -a2⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2912
-