Analysis
-
max time kernel
239s -
max time network
240s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
10/02/2025, 23:30
Behavioral task
behavioral1
Sample
Delta-Optimizateur.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Delta-Optimizateur.exe
Resource
win10v2004-20250207-en
General
-
Target
Delta-Optimizateur.exe
-
Size
42KB
-
MD5
d0787d6240e34493b6dd8b3a9224b9bc
-
SHA1
fa67ecde37854491adb09f70d010e466ad07b098
-
SHA256
7593df8001e16a07f5a3ffb155601a4dc41d7e6559d7ab25da2184edf95c1487
-
SHA512
9deede0996ee45a192cd86d87b92374e2d690be4c69b59e259f6276743632d010af7272218ab811f737c08bf26ca0d1adc4f53617de41bd988252be0fca1b2b5
-
SSDEEP
768:9vrhmlL9ra82j2uZ3L+ITjyKZKfgm3EhfqpA:alL9rc/L+ITmF7EVI
Malware Config
Extracted
mercurialgrabber
https://discord.com/api/webhooks/1298068921114693673/renj2UaUPCIHm1DPXGrhYNfxfFCNRldE2rrt_TqX6ptiSBIfxAbmiBkXrPPTIkrkO5ui
Signatures
-
Mercurial Grabber Stealer
Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.
-
Mercurialgrabber family
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions Delta-Optimizateur.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\VMWare, Inc.\VMWare Tools Delta-Optimizateur.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Delta-Optimizateur.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 10 discord.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip4.seeip.org 8 ip-api.com -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum Delta-Optimizateur.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 Delta-Optimizateur.exe -
Checks SCSI registry key(s) 3 TTPs 1 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_VMware_&Prod_VMware_Virtual_S Delta-Optimizateur.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemManufacturer Delta-Optimizateur.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemProductName Delta-Optimizateur.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Logical Unit Id 0 Delta-Optimizateur.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosInformation Delta-Optimizateur.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2508 Delta-Optimizateur.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Delta-Optimizateur.exe"C:\Users\Admin\AppData\Local\Temp\Delta-Optimizateur.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:2508