Analysis
-
max time kernel
93s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 07:50
Static task
static1
Behavioral task
behavioral1
Sample
198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe
Resource
win10v2004-20241007-en
General
-
Target
198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe
-
Size
614KB
-
MD5
23474ff9c46beb5767e6a9f0ec16af97
-
SHA1
3fdfb628a550edffdc4f9b342548e93132c39c57
-
SHA256
198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d
-
SHA512
359a099ab1bc7bee080efe90fd1aa9ff5f83b1ec6b99fad9f903e4dd06ff8b84bc9a49babb789aa52a4b44aad9e16e0662b7fb833f21621af03f9ee8c387e7b2
-
SSDEEP
12288:SQ6KyVtP9jocOXj4i6c4yplkM943ctZkmz4Ag/+LJPPzI:1yVtVEcOEi665zI
Malware Config
Signatures
-
Mercurial Grabber Stealer
Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.
-
Mercurialgrabber family
-
pid Process 1476 arp.exe 2552 arp.exe 2912 arp.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 3336 198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe 3336 198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe 3336 198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe 3336 198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe 3336 198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe 3336 198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe 3336 198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe 3336 198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe 3336 198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe 3336 198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe 3336 198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe 3336 198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe 3336 198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe 3336 198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe 3336 198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3336 198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3336 wrote to memory of 2912 3336 198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe 84 PID 3336 wrote to memory of 2912 3336 198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe 84 PID 3336 wrote to memory of 2912 3336 198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe 84 PID 3336 wrote to memory of 1476 3336 198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe 92 PID 3336 wrote to memory of 1476 3336 198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe 92 PID 3336 wrote to memory of 1476 3336 198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe 92 PID 3336 wrote to memory of 2552 3336 198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe 94 PID 3336 wrote to memory of 2552 3336 198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe 94 PID 3336 wrote to memory of 2552 3336 198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe"C:\Users\Admin\AppData\Local\Temp\198e375610bc330eaf9db731f61b302269fc195d7071710684114166796e1b9d.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Windows\SysWOW64\arp.exe"C:\Windows\System32\arp.exe" -a2⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2912
-
-
C:\Windows\SysWOW64\arp.exe"C:\Windows\System32\arp.exe" -a2⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1476
-
-
C:\Windows\SysWOW64\arp.exe"C:\Windows\System32\arp.exe" -a2⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2552
-