Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-01-2025 13:04
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_25478cb8612a3ae3e156805b33ecc624.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_25478cb8612a3ae3e156805b33ecc624.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_25478cb8612a3ae3e156805b33ecc624.exe
-
Size
614KB
-
MD5
25478cb8612a3ae3e156805b33ecc624
-
SHA1
8f2eb0b0664a3e808fc6efa3ff336a95ce2ddb1d
-
SHA256
f5d2f27645697270a66c845540017b05e3ec125c4d54ab3ba0f9f0487903657b
-
SHA512
5567ceb0e4ce6cb67fd1b1a21de1938060ec658a893887980071dfbc4c19c34ffb7ef1d95b58eb734ddb3e376cc5e02082a7431732291c96c0a3ebd322c08b37
-
SSDEEP
12288:SQ6KyVtP9jocOXj4i6c4yplkM943ctZkmz4Ag/+LJPPz:1yVtVEcOEi665z
Malware Config
Signatures
-
Mercurial Grabber Stealer
Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.
-
Mercurialgrabber family
-
pid Process 2224 arp.exe 2672 arp.exe 2732 arp.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_25478cb8612a3ae3e156805b33ecc624.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 2024 JaffaCakes118_25478cb8612a3ae3e156805b33ecc624.exe 2024 JaffaCakes118_25478cb8612a3ae3e156805b33ecc624.exe 2024 JaffaCakes118_25478cb8612a3ae3e156805b33ecc624.exe 2024 JaffaCakes118_25478cb8612a3ae3e156805b33ecc624.exe 2024 JaffaCakes118_25478cb8612a3ae3e156805b33ecc624.exe 2024 JaffaCakes118_25478cb8612a3ae3e156805b33ecc624.exe 2024 JaffaCakes118_25478cb8612a3ae3e156805b33ecc624.exe 2024 JaffaCakes118_25478cb8612a3ae3e156805b33ecc624.exe 2024 JaffaCakes118_25478cb8612a3ae3e156805b33ecc624.exe 2024 JaffaCakes118_25478cb8612a3ae3e156805b33ecc624.exe 2024 JaffaCakes118_25478cb8612a3ae3e156805b33ecc624.exe 2024 JaffaCakes118_25478cb8612a3ae3e156805b33ecc624.exe 2024 JaffaCakes118_25478cb8612a3ae3e156805b33ecc624.exe 2024 JaffaCakes118_25478cb8612a3ae3e156805b33ecc624.exe 2024 JaffaCakes118_25478cb8612a3ae3e156805b33ecc624.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2024 JaffaCakes118_25478cb8612a3ae3e156805b33ecc624.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2024 wrote to memory of 2224 2024 JaffaCakes118_25478cb8612a3ae3e156805b33ecc624.exe 32 PID 2024 wrote to memory of 2224 2024 JaffaCakes118_25478cb8612a3ae3e156805b33ecc624.exe 32 PID 2024 wrote to memory of 2224 2024 JaffaCakes118_25478cb8612a3ae3e156805b33ecc624.exe 32 PID 2024 wrote to memory of 2224 2024 JaffaCakes118_25478cb8612a3ae3e156805b33ecc624.exe 32 PID 2024 wrote to memory of 2672 2024 JaffaCakes118_25478cb8612a3ae3e156805b33ecc624.exe 33 PID 2024 wrote to memory of 2672 2024 JaffaCakes118_25478cb8612a3ae3e156805b33ecc624.exe 33 PID 2024 wrote to memory of 2672 2024 JaffaCakes118_25478cb8612a3ae3e156805b33ecc624.exe 33 PID 2024 wrote to memory of 2672 2024 JaffaCakes118_25478cb8612a3ae3e156805b33ecc624.exe 33 PID 2024 wrote to memory of 2732 2024 JaffaCakes118_25478cb8612a3ae3e156805b33ecc624.exe 34 PID 2024 wrote to memory of 2732 2024 JaffaCakes118_25478cb8612a3ae3e156805b33ecc624.exe 34 PID 2024 wrote to memory of 2732 2024 JaffaCakes118_25478cb8612a3ae3e156805b33ecc624.exe 34 PID 2024 wrote to memory of 2732 2024 JaffaCakes118_25478cb8612a3ae3e156805b33ecc624.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_25478cb8612a3ae3e156805b33ecc624.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_25478cb8612a3ae3e156805b33ecc624.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\arp.exe"C:\Windows\System32\arp.exe" -a2⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2224
-
-
C:\Windows\SysWOW64\arp.exe"C:\Windows\System32\arp.exe" -a2⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2672
-
-
C:\Windows\SysWOW64\arp.exe"C:\Windows\System32\arp.exe" -a2⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2732
-