Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
07-12-2024 01:48
Behavioral task
behavioral1
Sample
output.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
output.exe
Resource
win10v2004-20241007-en
General
-
Target
output.exe
-
Size
42KB
-
MD5
6df2f04b617beb9cd0454f528fa5dba9
-
SHA1
85dbecd06ccfcc52a701cb541a21e5fe56932d7f
-
SHA256
2815e46ccd7635b296686fc9a9b3691998cd9a274fe2a7a94c61c6699d9a5c50
-
SHA512
5e2dc191773ed78a0c55d133a9c8fd056970b252d55a4f8c9c80df57447f67423e68db9bf4cc12087818231f4fb9effdbe58923c03ef58616c191fdb6f7ba672
-
SSDEEP
768:cLIBZ6aWPpDtsmuZ2L65TjlKZKfgm3EhYJ:j1WPPsOL65ThF7EuJ
Malware Config
Extracted
mercurialgrabber
https://discord.com/api/webhooks/1314767049267875882/NJaVPRXpYcNaXw4sYAd4msJ1JNHj6CEOspxK1vQ1Tfi33pJwKx_KRpnxTaxOkBxp5v3W
Signatures
-
Mercurial Grabber Stealer
Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.
-
Mercurialgrabber family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 8 discord.com 9 discord.com 10 discord.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip4.seeip.org 6 ip-api.com -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString output.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 output.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2652 output.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2232 2652 output.exe 33 PID 2652 wrote to memory of 2232 2652 output.exe 33 PID 2652 wrote to memory of 2232 2652 output.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\output.exe"C:\Users\Admin\AppData\Local\Temp\output.exe"1⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2652 -s 13962⤵PID:2232
-