Analysis

  • max time kernel
    94s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-11-2024 10:38

General

  • Target

    fn acc gen.exe

  • Size

    162KB

  • MD5

    3f5779efee67128a8e65f852416a1f0c

  • SHA1

    5ffcb2e4f5572c2810decdbdd319506594caf1f7

  • SHA256

    7219d02197027629ab7d87710ac65e091b9ab3e78673328d0082038a17b0eb37

  • SHA512

    4cc553a44ebf1d5c5089215e2dc201f91a91660fc766dc5e8bb1a853c4bfaa9558e5be3d8c208dc17aba3e5a936abfe0a9e610044db32e856b559fe0319ee6ed

  • SSDEEP

    1536:WcFIr2RVeDHWToF7EWyXC2DddrM6N6C0f/9J3VJsnkwCHXEEEE9QxqV4Oic1:XxRVeqToF7EBXCArZI3KaQlOiO

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/924451258591485993/JyCqNBCgVevF8igfGtv_fng3Q8Mx1Xkal-W61Hli2GrTCMzpctHcxGYUXZrZ0wTbejHY

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\fn acc gen.exe
    "C:\Users\Admin\AppData\Local\Temp\fn acc gen.exe"
    1⤵
    • Looks for VirtualBox Guest Additions in registry
    • Looks for VMWare Tools registry key
    • Checks BIOS information in registry
    • Maps connected drives based on registry
    • Checks SCSI registry key(s)
    • Enumerates system info in registry
    • Suspicious use of AdjustPrivilegeToken
    PID:2672

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2672-1-0x00007FF8A8573000-0x00007FF8A8575000-memory.dmp

    Filesize

    8KB

  • memory/2672-0-0x0000000000AC0000-0x0000000000AEE000-memory.dmp

    Filesize

    184KB

  • memory/2672-2-0x00007FF8A8570000-0x00007FF8A9031000-memory.dmp

    Filesize

    10.8MB

  • memory/2672-3-0x00007FF8A8570000-0x00007FF8A9031000-memory.dmp

    Filesize

    10.8MB

  • memory/2672-7-0x00007FF8A8570000-0x00007FF8A9031000-memory.dmp

    Filesize

    10.8MB